Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,

Slides:



Advertisements
Similar presentations
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Advertisements

Communication Networks Recitation 3 Bridges & Spanning trees.
University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
Topic 7 Local Area Networks (LAN)
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 19 Introduction to Computer Networks.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
5: DataLink Layer5-1 Mac Addressing, Ethernet, and Interconnections.
Chabot College Chapter 2 Review Questions Semester IIIELEC Semester III ELEC
CPSC 441 TUTORIAL TA: FANG WANG HUBS, SWITCHES AND BRIDGES Parts of the slides contents are courtesy of the following people: Jim Kurose, Keith Ross:
The Data Link Layer introduction point-to-point data link protocols
1 Data Link Layer Ethernet Bridges Token Ring. 2 Summary of MAC protocols What do you do with a shared media? Channel Partitioning: time, frequency or.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
1 Computer Networks Internetworking Devices. 2 Repeaters Hubs Bridges –Learning algorithms –Problem of closed loops Switches Routers.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: Data Link Layer:
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
1 Interconnecting LAN segments Repeaters Hubs Bridges Switches.
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
5: DataLink Layer5a-1 Summary of MAC protocols r What do you do with a shared media? m Channel Partitioning, by time, frequency or code Time Division,Code.
IP Address 0 network host 10 network host 110 networkhost 1110 multicast address A B C D class to to
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
1 Computer Networks LAN Bridges and Switches. 2 Where are we?
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Connecting LANs, Backbone Networks, and Virtual LANs
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 5 outline 5.1 Introduction and services
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 26 Omar Meqdadi Department of Computer Science and Software Engineering.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Our Last Class!!  summary  what does the future look like?
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r multiple access protocols and LANs r link layer addressing, ARP r specific link layer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks 15-1 Connecting Devices. Connecting Device We divide connecting devices into five different categories based on the layer in which they.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Multiple Access Links and Protocols
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r link layer services r error detection, correction r multiple access protocols and LANs.
Ch 5. The Link Layer and Local Area Networks Myungchul Kim
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
4: DataLink Layer1 Hubs r Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces.
Computer Communication and Networking Lecture # 4 by Zainab Malik 1.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
Lec # 25 Computer Network Muhammad Waseem Iqbal. Learn about the Internetworking Devices – Repeaters – Hubs – Switches – Bridges – Routers.
4: DataLink Layer1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Computer Communication Networks
Chapter 3 Part 1 Switching and Bridging
MAC Addresses and ARP 32-bit IP address:
Bridging.
Chapter 4 Data Link Layer Switching
Hubs Hubs are essentially physical-layer repeaters:
ARP: Address Resolution Protocol
Chapter 3 Part 1 Switching and Bridging
Hubs Hubs are essentially physical-layer repeaters:
Chapter 15. Connecting Devices
Chapter 5 Data Link Layer – Hub, Switch
Virtual LAN (VLAN).
Presentation transcript:

Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start, end of packet

IEEE802.5 standard  AC access control byte:  token bit: value 0 means token can be seized, value 1 means data follows FC  priority bits: priority of packet  reservation bits: station can write these bits to prevent stations with lower priority packet from seizing token after token becomes free  FC frame control: used for monitoring and maintenance

IEEE802.5 standard  source, destination address: 48 bit physical address, as in Ethernet  data: packet from network layer  checksum  frame status (FS): set by destination, read by sender  set to indicate destination is up, pkt copied OK from ring  DLC-level ACKing

Time Division Multiple Access  TDMA: time division multiple access  access to channel in "rounds"  each station gets fixed length slot (pkt trans time) in each round  unused slots go idle  example: 6-station LAN, 1,3,4 have pkt, 2,5,6 idle Pros and cons:

Reservation-based Protocols  want to avoid wasted slots in TDMA  access to channel in rounds (again). Each round:  begins with N short reservation slots  reservation slot time equal to end-end propagation delay of channel  station with message to send posts reservation (1) in its reservation slot  reservation slots seen by all stations  after reservation slots, message transmissions ordered by known priority

Pros and cons:

Critical Assessment of Multiple Access Protocols Random access: Alohas, CSMA, group Controlled, predetermined: TDMA Controlled demand adaptive: tokens, reservation

ARP: Address Resolution Protocol  IEEE802.* (Ethernet, token ring/bus) interface cards only recognize 48-bit IEEE 802. physical layer addresses on packets  network layer uses IP address (32 bits) Q: how to determine physical address of machine with given IP address?

ARP : Address Resolution Protocol  A knows B's IP address, wants to learn physical address of B  A broadcasts ARP query pkt, containing B's IP address  all machines on LAN receive ARP query  B receives ARP packet, replies to A with its (B's) physical layer address  A caches (saves) IP-to-physical address pairs until information becomes old (times out) soft state: information that times out (goes away)

Routing and Physical Layer Addresses: synthesis  P Host A knows router R is next hop to IP destination B:  A creates IP packet with source A, destination B  A uses ARP to get physical layer address of R  A creates Ethernet packet with R's physical address as dest, Ethernet packet contains A-to-B IP packet  A sends Ethernet packet  R receives Ethernet packet  R removes IP datagram from Ethernet packet, sees it is destined to B  R creates physical layer packet, containing A-to-B IP datagram and sends to next router on route to B

Interconnecting LANs Why not just one big LAN?  limited amount of supportable traffic: on single LAN, all stations must share bandwidth  limited length: specifies maximum cable length  limited number of stations: 802.4/5 have token passing delays at each station

Bridges and Repeaters Bridges versus Repeaters for interconnecting LANs Repeater  copies (amplifies, regenerates) bits between LAN segments  no storage of packets  physical-level (only) interconnection of LANs Bridge  receives, stores, forward (when appropriate) packets between LANs  has two layers of protocol stack: physical and link- level (media access)

Bridges versus routers Bridges are arguably routers  know physical layer addresses of stations on each interconnected LAN  receive and selectively forwards packets transmitted on LAN

Bridges versus routers Bridges are not routers  no knowledge of "outside world", only stations on interconnected LAN  bridges don't exchange routing tables  deal only with physical layer addresses

Bridges: Forward Packets Bridges filter packets  intra-LAN -segment pkts not forwarded onto other LAN segments  inter-LAN-segment pkts must be forwarded, but where?

Bridges: Forward Packets Techniques for forwarding packets  flood packets (obvious drawbacks)  router-discovery-like protocol  allows bridge to identify hosts on LAN segment  drawbacks?  bridge "observes" traffic and "learns" which stations are attached  transparent: just add bridge to LAN, all hosts behave as if bridge were not there

Transparent Bridges 1. bridge receives every packet transmitted on every attached LAN 2. bridge stores for each packet  physical address of sender  port (incoming LAN segment) on which pkt was received 3. for each packet received on any port: lookup dest. physical address in table  if not found, flood onto all attached LANs  if found, forward only out to specified LAN 4. forwarding table entriesdeleted if not refreshed (by 2) 4. forwarding table entriesdeleted if not refreshed (by 2)

Transparent Bridges: example Example: C sends packet to D; D replies with packet to C

C sends packet, bridge has no info about D; floods both LANs  bridge C on port 1  packet ignored on upper LAN  packet received by D D generates reply to C; sends  bridge sees packet from D  bridge notes that D is on part 2  bridge knows C on port 1; selectively forwards packet on part 1

Extended LAN with Loops Need to create spanning tree Distributed spanning tree algorithm  bridge with lowest id chosen as root  create minimum distance tree to root  similar to DVMRP approach  failure detection: root periodically sends messages down tree to other bridges

Bridges: the headaches of 3 LAN standards Computation  bridge may need to translate between standards (each 802.* has different format)  translated packet requires new checksum Speed mismatch  different 802.* LAN's operate at different speeds  what if lots of Ethernet traffic destined to token ring?

Bridges: the headaches of 3 LAN standards Size mismatches  has 1518 byte max packet size, has 8191 byte max packet size  what if pkt forwarded onto Ethernet?  fragmentation at physical layer?  drop packet (the IEEE standard) Other mismatches  has priorities; does not ...

Switched LAN's  bridges interconnect general 802.* LANs  may require packet conversion Switched Ethernet:  central "hub" interconnects ethernet segments  in practice, each segment often has only one computer  simultaneous transmission to same destination  let first one through  possibly buffer other packets

Switched LAN's

DLC Summary  point-to-point DLC: "standard" reliable data transfer techniques  the multiple access problem  random access protocols (collisions)  demand adaptive, controlled (collision) free protocols: token passing, mini-slotted reservations  TDMA  IEEE 802.* standards: Ethernet, token bus and ring  bridges, switches for interconnecting LANs