Presentation is loading. Please wait.

Presentation is loading. Please wait.

CSE331: Introduction to Networks and Security Lecture 6 Fall 2002.

Similar presentations


Presentation on theme: "CSE331: Introduction to Networks and Security Lecture 6 Fall 2002."— Presentation transcript:

1 CSE331: Introduction to Networks and Security Lecture 6 Fall 2002

2 CSE331 Fall 20022 Announcements Project 1 will be handed out this Friday –Form groups of two or three –Mail group members to Aditya achadha@gradient.cis.upenn.edu –If you can’t find a partner, mail Aditya –Groups should be formed before project is handed out

3 CSE331 Fall 20023 Recap Ethernet –Exponential backoff algorithm 802.11

4 CSE331 Fall 20024 Today Finish up link layer –802.11 –(briefly) Token Rings Packet Switching

5 CSE331 Fall 20025 Multiple Access Collision Avoidance Sender transmits Request To Send (RTS) –Includes length of data to be transmitted –Timout leads to exponential backoff (like Ethernet) Receiver replies with Clear To Send (CTS) –Echoes the length field Receiver sends ACK of frame to sender Any node that sees CTS cannot transmit for durations specified by length Any node that sees RTS but not CTS is not close enough to the receiver to interfere –It’s free to transmit

6 CSE331 Fall 20026 Wireless Access Points Distribution System – wired network infrastructure Access points – stationary wireless device Roaming wireless Distribution System AP1 AP2 AP3A B C D

7 CSE331 Fall 20027 Selecting an Access Point Active scanning –Node sends a Probe frame –All AP’s within reach reply with a Probe Response frame –Node selects an AP and sends Association Request frame –AP replies with Association Response frame Passive scanning –AP periodically broadcasts Beacon frame –Node sends Association Request

8 CSE331 Fall 20028 Node Mobility B moves from AP1 to AP2 B sends Probes, eventually prefers AP2 to AP1 Sends Association Request Distribution System AP1 AP2 AP3A B C D B

9 CSE331 Fall 20029 Frame Format Ctrl: flags (CTS, RTS, or Data?) Body up to 2312 bytes 4 addresses 4 1 32 CtrlLengthAddr1Addr2Addr3Addr4SeqBodyCRC 16 48 1632

10 CSE331 Fall 200210 802.11 Security Issues Packet sniffing is worse –No physical connection needed –Long range (6 blocks) –Current encryption standards (WEP) not that good –WEP = Wired Equivalent Privacy –http://www.nakedwireless.ca/winudcol.htmhttp://www.nakedwireless.ca/winudcol.htm Denial of service –Association (and Disassociation) Requests are not authenticated We’ll talk more about these issues in the security part of the course.

11 CSE331 Fall 200211 Token Rings IBM Token Ring (IEEE 802.5) –Support 4Mbps or 16Mbps over twisted pair for about 250 nodes. FDDI = Fiber Distributed Data Interface –It supports 100Mbps for as much as 200km of fiber and 500 nodes (with at most 2km between nodes). Data always flows one direction around the ring.

12 CSE331 Fall 200212 Token Ring MAC The token is a special bit pattern –Sender gets the token –Inserts a frame –Waits for the frame to return –Forwards the token

13 CSE331 Fall 200213 Token Ring Issues THT = Token Hold Time –Prevent one node from hogging the network –Higher THT = better utilization, but not as fair –Typical THT = 10ms for IBM Token Ring What happens when a node fails? –Must ensure that ring is unbroken. –What happens if the token is lost? Nodes elect a monitor station –Periodically sends “status OK” message –Ensures that there is always one token.

14 CSE331 Fall 200214 OSI Reference Model Application Presentation Session Transport Network Data Link Physical Covered so far: Ethernet, 802.11, Token Rings Next: Packet switching, IP

15 CSE331 Fall 200215 Packet Switching A switch –Has many inputs and many outputs –Takes packets that arrive on an input and forwards them to the right output Key problem: finite output bandwidth Switch

16 CSE331 Fall 200216 Star Topology Scalability –Large networks can be built by interconnecting switches. –Can connect via high bandwidth point-to-point links = large distances. –Adding a new host to a switch doesn’t necessarily degrade performance.

17 CSE331 Fall 200217 Switching Issues Contention –Arrival rate of packets going to the same output exceeds output capacity –Switch buffers packets Congestion –Switch runs out of buffer space –Forces packets to be dropped

18 CSE331 Fall 200218 Forwarding Decision How does the switch know where to forward a packet? –Looks at the packet header to make the decision Common approaches –Datagram (or connectionless) e.g. IP –Virtual Circuit (or connection-oriented) e.g. Frame Relay, ATM –(Less common) Source routing

19 CSE331 Fall 200219 Datagram approach Every packet contains a complete destination address –Enough information so that any switch can decide where the packet goes. Features of datagram approach –Packets can be sent at anywhere at any time –Sender doesn’t know if network can deliver the packet (or if destination host is available) –Each packet is forwarded independently (two packets may take different routes) –Possible to route around switch or link failures

20 CSE331 Fall 200220 Forwarding Tables D C A G H E F B 0 1 2 3 0 1 2 3 0 1 2 3 Port numbers 12 3 Dest. A B C D E F G H Port 3 2 3 0 1 2 Forwarding table for switch 2. Provide route information. Easy to determine if network is known (and unchanging)

21 CSE331 Fall 200221 Virtual Circuit Switching D C A G H E F B 0 1 2 3 0 1 2 3 0 1 2 3 12 3 In Port 2 3 0 In VCI 5 11 7 Out Port 1 2 1 Out VCI 11 7 8 Switch 1 2 3 VCI = Virtual Circuit Identifier Incoming port + VCI uniquely identify virtual circuit Setup phase constructs circuit table entries at each switch 5 11 7 4

22 CSE331 Fall 200222 Virtual Circuits Setup phase –Initial setup message contains complete destination address –Intermediate switches (outgoing pass) Allocate an entry in the table Record In Port, Out Port Generate incoming VCI –Intermediate switches (return pass) Get the outgoing VCI from next hop Reply to previous hop with the incoming VCI

23 CSE331 Fall 200223 Virtual Circuit Switching Features Sender must wait for 1 RTT (minimum) before first data is sent Per-packet overhead reduced –After setup, only port # & VCI needed (small) –Compare to full address in datagrams (big) If a switch or link fails, connection is broken –Also, must deallocate old entries to free up space Can allocate resources to the virtual circuit –Buffer space for reliable, in order delivery –Percentage of outgoing bandwidth (QoS)

24 CSE331 Fall 200224 Source Routing Sender knows net topology Indicates sequence of ports as part of packet –(many implementations) Headers of variable (unbounded?) length IP includes source route option D C A G H E F B 0 1 2 3 0 1 2 3 0 1 2 3 12 3 1,2,1 2,1 1

25 CSE331 Fall 200225 Bridges and LAN Switches ABC XYZ Bridge Bridge accepts LAN frames on one port, outputs them on another. Optimization: only forward appropriate frames Learning bridges – watch incoming source address A at port number X – add entry to forward address A to port X – if no entry, broadcast to all ports – doesn’t work if there are loops! 1 2


Download ppt "CSE331: Introduction to Networks and Security Lecture 6 Fall 2002."

Similar presentations


Ads by Google