CSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging)

Size: px
Start display at page:

Download "CSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging)"

Transcription

1 S/ 461 Lecture 7 ridging LNs Last Two Times Medium ccess ontrol (M) protocols Part of the Link Layer t the heart of Local rea Networks (LNs) ow do multiple parties share a wire or the air? Random access protocols (SM/) ontention-free protocols (turn-taking, reservations) Wireless protocols (SM/ and RTS/TS) This Time -- Switching (a.k.a. ridging) ocus: What to do when one shared LN isn t big enough? nterconnecting LNs ridges and LN switches preview of the Network layer pplication Presentation Session Transport Network ata Link Physical 1

2 Limits of a LN One shared LN can limit us in terms of: istance Number of nodes Performance nodes (wire) ub (repeater) ow do we scale to a larger, faster network? We must be able to interconnect LNs Switching (a.k.a. ridging) Transferring a packet from one LN to another LN uild an extended LN ifferent varieties of switching Packet switched vs. circuit switched onnection vs. onnectionless We ll focus on connectionless, packet switched thernet ridges and xtended LNs Transparently interconnect LNs with bridge Receive frames from each LN and forward to the other ach LN is its own collision domain; bridge isn t a repeater ould have many ports bridge 2

3 Learning ridges To optimize overall performance: Shouldn t forward or, should forward and bridge ow does the bridge know? Learn who is where by observing source addresses and prune orward using destination address; age for robustness Why stop at one bridge? llows you to incrementally build out network, across organizations 3 5 ut must avoid loops -- bridge must forward only on some bridge ports! The Spanning Tree algorithm does this t is separate from previous idea of learning K Spanning Tree xample Spanning tree uses select bridge ports so there are no cycles Prune some ports Only one tree K Q: ow do we find a spanning tree? utomatically with a distributed algorithm

4 Spanning Tree ompute ST with a bridge as root such that Root forwards onto all of its outgoing ports Other bridges forward TO the root if a packet is coming from a bridge further from the root, else they forward away from the root Packet traversal: forwards (UP)* then (OWN*) Spanning tree vs. learning Once the spanning tree is in place the bridge uses the regular learning algorithm to figure out which ports to forward / flood packet on ob of spanning tree algorithm is to disable some ports to eliminate cycles Spanning Tree lgorithm istributed algorithm to compute spanning tree Robust against failures, needs no organization eveloped by Radia Perlman at spec Outline: oal is to turn some bridge ports off 1. lect a root node of the tree (lowest address) 2. row tree as shortest distances from the root (using lowest address to break distance ties) ll done by bridges sending periodic configuration messages over ports for which they are the best path Then turn off ports that aren t on best paths 4

5 lgorithm Overview ach bridge has a unique id e.g., 1, 2, 3 Select the bridge with the smallest id as root Select bridge on each LN that is closest to the root as that LN s designated bridge use ids to break ties K ach bridge forwards frames over each LN on which it is the designated bridge lgorithm continued ridges exchange configuration messages, containing: id for bridge sending the message id for what the sending bridge believes to be the root bridge distance (hops) from sending bridge to root bridge ach bridge records current best configuration message for each port nitially, each bridge believes it is the root when learn not root, stop generating configuration messages instead, forward root s configuration message incrementing distance field by 1 in steady state, only root generates configuration messages lgorithm More When learn not designated bridge on LN, stop forwarding configuration messages in steady state, only designated bridges forward configuration messages Root bridge continues to send configuration messages periodically f a bridge does not receive config. message after a period of time: assumes topology has changed starts generating configuration messages claiming to be root 5

6 lgorithm xample Message format: (root, dist-to-root, sending bridge) Sample messages sequences to and from 3: 1. 3 sends (3, 0, 3) to 2 and receives (2, 0, 2) and (5, 0, 5) and accepts 2 as root 3. 3 sends (2, 1, 3) to receives (1, 1, 2) and (1, 1, 5) and accepts 1 as root K 5. 3 could send (1, 2, 3) but doesn t as its nowhere best 2 and 5 are better choices. so 3 is NOT a designated bridge 6. 3 receives (1, 1, 2) and (1, 1, 5) again stable 3 turns off data forwarding to LNs and 6 4 Some other tricky details onfiguration information is aged f the root fails a new one will be elected Reconfiguration is damped dopt new spanning trees slowly to avoid temporary loops LN Switches LN switches are multi-port bridges Modern, high performance form of bridged LNs Looks like a hub, but frames are switched, not shared very host on a separate port, or can combine switches thernet Switch thernet Switch 6

7 Limitations of ridges/switches LN switches form an effective small-scale network Plug and play for real! Why can t we build a large network using bridges? Little control over forwarding paths Size of bridge forwarding tables grows with number of hosts roadcast traffic flows freely over whole extended LN Spanning tree algorithm limits reconfiguration speed Poor solution for connecting LNs of different kinds Key oncepts We can overcome LN limits by interconnection ridges and LN switches ut there are limits to this strategy Next Topic: Routing and the Network layer ow to grow large and really large networks 7

CSE 461: Bridging LANs. Last Topic

CSE 461: Bridging LANs. Last Topic CSE 461: Bridging LANs Last Topic Medium Access Control (MAC) protocols Part of the Link Layer At the heart of Local Area Networks (LANs) How do multiple parties share a wire or the air? Random access

More information

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging) Administrivia CSC458 Lecture 4 Bridging LANs and IP Homework: # 1 due today # 2 out today and due in two weeks Readings: Chapters 3 and 4 Project: # 2 due next week Tutorial today: Joe Lim on project 2

More information

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel?

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel? Lecture 6: ridging & Switching SE 3: omputer Networks hris Kanich Project countdown: 5 days Last time How do multiple hosts share a single channel? Medium ccess ontrol (M) protocols hannel partitioning

More information

Lecture 6: Bridges and Switches. CS/ECE 438: Communication Networks Prof. Matthew Caesar February 19, 2010

Lecture 6: Bridges and Switches. CS/ECE 438: Communication Networks Prof. Matthew Caesar February 19, 2010 Lecture 6: ridges and Switches CS/C 48: Communication Networks Prof. Matthew Caesar February 9, How can many hosts communicate? Naïve approach: full mesh Problem: doesn t scale How can many hosts communicate?

More information

Some portions courtesy Srini Seshan or David Wetherall

Some portions courtesy Srini Seshan or David Wetherall CSE 123 Computer Networks Fall 2009 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Misc Homework solutions have been posted I ll post a sample

More information

CSEP 561 LAN Switches. David Wetherall

CSEP 561 LAN Switches. David Wetherall CSEP 561 LAN Switches David Wetherall djw@cs.washington.edu How to combine links into a simple network Topics: Switch internals Plug and play LANs (switched Ethernet) Application Transport Network Building

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Last Time How do multiple hosts share a single channel?

More information

Switching and Forwarding

Switching and Forwarding Switching and Forwarding Outline Store-and-Forward Switches Bridges and Extended LANs Spring 7 CSE64 Switch Switching protocol T T STS- Spring 7 CSE64 Scalable Networks Switch forwards packets from input

More information

Now Arriving at Layer 3. Packet Forwarding. Router Design. Network Layers and Routers. Switching and Forwarding. Forwarding

Now Arriving at Layer 3. Packet Forwarding. Router Design. Network Layers and Routers. Switching and Forwarding. Forwarding Now rriving at Layer Packet orwarding although layer switches and layer routers are similar in many ways and TM/Virtual are used at layer these days 9/7/6 S/ 48 - UIU, all 6 9/7/6 S/ 48 - UIU, all 6 Layers

More information

CS Networks and Distributed Systems. Lecture 5: Bridging. Revised 1/14/13

CS Networks and Distributed Systems. Lecture 5: Bridging. Revised 1/14/13 CS 3700 Networks and Distributed Systems Lecture 5: Bridging Revised 1/14/13 Just Above the Data Link Layer 2 Application Presentation Session Transport Network Data Link Physical Bridging! How do we connect

More information

Research paper Measured Capacity of an Ethernet: Myths and Reality

Research paper Measured Capacity of an Ethernet: Myths and Reality Research paper Measured apacity of an Ethernet: Myths and Reality Theoretical work seems to suggest that Ethernet works saturate at 7%. Realistic networks can offer higher throughputs Lessons learnt Don

More information

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges ridge Functions To extend size of LNs either geographically or in terms number of users. Protocols that include collisions can be performed in a collision domain of limited size. In ring networks the number

More information

Switching and Forwarding

Switching and Forwarding Switching and Forwarding Outline Store-and-Forward Switches ridges and Extended LNs ell Switching Segmentation and Reassembly Scalable Networks Switch forwards packets from input port to output port port

More information

Switching and Forwarding - continued

Switching and Forwarding - continued Fall 9/7 CptS/EE 555 Fall 9/7 CptS/EE 555 4 Housekeeping Look at select system call See homework solutions on the Lecture Notes web page for answer to the probability difficulties we (I) had last time

More information

Switching and Forwarding - continued

Switching and Forwarding - continued Fall 9/ CptS/EE 555 Fall 9/ CptS/EE 555 4 Housekeeping Look at select system call See homework solutions on the Lecture Notes web page for answer to the probability difficulties we (I) had last time No

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)

More information

Recap. Requirements of Networks. Overview of the lecture LAN. Types of Networks. Lecture 03: Networking

Recap. Requirements of Networks. Overview of the lecture LAN. Types of Networks. Lecture 03: Networking Lecture : Networking istributed Systems ehzad ordbar School of omputer Science, University of irmingham, UK Recap rchitecture, what? and why? Tiered rchitecture Various software layer: middleware client/server

More information

WAN Technology and Routing

WAN Technology and Routing PS 60 - Network Programming WN Technology and Routing Michele Weigle epartment of omputer Science lemson University mweigle@cs.clemson.edu March, 00 http://www.cs.clemson.edu/~mweigle/courses/cpsc60 WN

More information

Lecture 8: Networks to Internetworks

Lecture 8: Networks to Internetworks Lecture 8: Networks to Internetworks CSE 123: Computer Networks Alex C. Snoeren NO CLASS FRIDAY Lecture 8 Overview Bridging & switching Learning bridges Spanning Tree Internetworking Routering Internet

More information

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1 Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is

More information

Announcements. CS 5565 Network Architecture and Protocols. Ethernet. Ethernet. Ethernet Model. Ideal Multiple Access Protocol

Announcements. CS 5565 Network Architecture and Protocols. Ethernet. Ethernet. Ethernet Model. Ideal Multiple Access Protocol nnouncements CS 5565 Network rchitecture and Protocols Lecture 4 odmar ack Project due in parts: pr 5 and May xtra Credit Opportunities: xpand simulator (and your implementation) to introduce multiple

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 9: Bridging Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern

More information

CSE/EE 461 Distance Vector Routing

CSE/EE 461 Distance Vector Routing S/ 46 istance Vector Routing Last Time Introduction to the Network layer Internetworks atagram and virtual circuit services Internet Protocol (IP) packet format The Network layer Provides end-to-end data

More information

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, Chapters 4.3.4

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 20: Bridging Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui

More information

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any

More information

Third Generation Routers

Third Generation Routers IP orwarding 5-5- omputer Networking 5- Lecture : Routing Peter Steenkiste all www.cs.cmu.edu/~prs/5-- The Story So ar IP addresses are structured to reflect Internet structure IP packet headers carry

More information

What is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats

What is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats What is Routing? Routing implements the core function of a network: : Shortest Path Routing Ion Stoica Ts: Junda Liu, K Moon, avid Zats http://inst.eecs.berkeley.edu/~ee/fa9 (Materials with thanks to Vern

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

Lecture 9: Bridging & Switching"

Lecture 9: Bridging & Switching Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link

More information

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing IP orwarding - omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSP (Open Shortest Path irst) The Story So ar IP addresses are structure to reflect Internet structure

More information

Loop Cutting in the Original and Rapid Spanning Tree Algorithms

Loop Cutting in the Original and Rapid Spanning Tree Algorithms Loop utting in the Original and apid Spanning Tree lgorithms Introduction Mick Seaman This note compares the different strategies for preventing temporary loops in the original (STP) and rapid reconfiguration

More information

TCOM 501: Networking Theory & Fundamentals. Lecture 11 April 16, 2003 Prof. Yannis A. Korilis

TCOM 501: Networking Theory & Fundamentals. Lecture 11 April 16, 2003 Prof. Yannis A. Korilis TOM 50: Networking Theory & undamentals Lecture pril 6, 2003 Prof. Yannis. Korilis 2 Topics Routing in ata Network Graph Representation of a Network Undirected Graphs Spanning Trees and Minimum Weight

More information

Discussion 8: Link State Routing. CSE 123: Computer Networks Marti Motoyama & Chris Kanich

Discussion 8: Link State Routing. CSE 123: Computer Networks Marti Motoyama & Chris Kanich iscussion 8: Link State Routing S : omputer Networks Marti Motoyama & hris Kanich Schedule Project Questions: mail hris, post to moodle, or attend his OH Homework Questions? Link State iscussion S iscussion

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21! CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also

More information

LAN Local Area Networks. CSMA/CD restriction. Bits on the Wire. PacketSize 2 * COMP476 Networked Computer Systems. Interconnecting

LAN Local Area Networks. CSMA/CD restriction. Bits on the Wire. PacketSize 2 * COMP476 Networked Computer Systems. Interconnecting Interconnecting s COMP476 ed Computer Systems LN Local rea s There is a Limit to the Maximum Length of a LN - Ethernet cables (segments) can be up to 500m. - The restrictions are due to power and propagation

More information

Announcements. Ethernet. Goals of Today s Lecture. Three Ways to Share the Media. Random Access Protocols. Key Ideas of Random Access

Announcements. Ethernet. Goals of Today s Lecture. Three Ways to Share the Media. Random Access Protocols. Key Ideas of Random Access Ethernet EE 1: Intro to ommunication Networks Fall 00 (WF -:0 in ory ) Vern Paxson Ts: Lisa Fowler, aniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee1/ nnouncements Solutions for Homework

More information

IP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing

IP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing IP Forwarding 5-44 omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) The Story So Far IP addresses are structured to reflect Internet

More information

The Basics of Wireless Communication Octav Chipara

The Basics of Wireless Communication Octav Chipara The asics of Wireless ommunication Octav hipara genda hannel model: the protocol model High-level media access TM, SM hidden/exposed terminal problems WLN Fundamentals of routing proactive on-demand 2

More information

ECE 435 Network Engineering Lecture 21

ECE 435 Network Engineering Lecture 21 ECE 435 Network Engineering Lecture 21 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 27 November 2018 Announcements HW#9 was posted Project Status One e-mail per group One-line

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Distance-Vector Routing: Distributed B-F (cont.)

Distance-Vector Routing: Distributed B-F (cont.) istance-vector Routing: istributed - (cont.) xample [ istributed ellman-ord lgorithm ] ssume each node i maintains an entry (R(i,x), L(i,x)), where R(i,x) is the next node along the current shortest path

More information

A Meshed Tree Algorithm for Loop Avoidance in Switched Networks

A Meshed Tree Algorithm for Loop Avoidance in Switched Networks INS 202 : The ighth International onference on Networking and Services Meshed Tree lgorithm for Loop voidance in Switched Networks Nirmala Shenoy Networking Security and Systems dministration epartment

More information

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges.

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges. Introduction to Communication Networks Spring 2007 Unit 13 Network extensions Bridges. Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Slides from lectures

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE : Introduction to Communication Networks Fall 00 Lecture : Routing and Addressing I Introduction to Routing/Addressing Lectures 9- described the main components of point-to-point networks, i.e. multiplexed

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

LAN Overview (part 2) Interconnecting LANs - Hubs

LAN Overview (part 2) Interconnecting LANs - Hubs LAN Overview (part 2) CSE 3213 Fall 2011 1 November 2011 Interconnecting LANs - Hubs active central element of star layout each station connected to hub by two UTP lines hub acts as a repeater limited

More information

Let s focus on clarifying questions. More Routing. Logic Refresher. Warning. Short Summary of Course. 10 Years from Now.

Let s focus on clarifying questions. More Routing. Logic Refresher. Warning. Short Summary of Course. 10 Years from Now. Let s focus on clarifying questions I love the degree of interaction in this year s class More Routing all Scott Shenker http://inst.eecs.berkeley.edu/~ee/ Materials with thanks to Jennifer Rexford, Ion

More information

Computer Networks Principles LAN - Ethernet

Computer Networks Principles LAN - Ethernet Computer s Principles LN - thernet Prof. ndrzej Duda duda@imag.fr Interconnection structure - layer subnetwork interconnection layer interconnection layer subnet subnet router switch (bridge) VLN http://duda.imag.fr

More information

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 7: Switching technologies Chapter 3.1 Xiaowei Yang xwy@cs.duke.edu Types of switching Datagram Virtual circuit Source routing Today Bridges and LAN switches

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE 333: Introduction to Communication Networks Fall 00 Lecture 9: Switching and Multiplexing More on transparent bridges. Introduction to Switching and Multiplexing Transparent bridges continued: Last

More information

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University ommunication Networks (0368-3030) / Sprin 0 The lavatnik School o omputer Science, Tel-viv University llon Waner urose & Ross, hapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, hapters 4.3.4 4.3.8 (5 th

More information

Switching and bridging

Switching and bridging Switching and bridging CSCI 466: Networks Keith Vertanen Fall 2011 Last chapter: Overview Crea7ng networks from: Point- to- point links Shared medium (wireless) This chapter: SoCware and hardware connec7ng

More information

2/16/2008. Outline Computer Networking Lecture 11 Routing. Sending Link States by Flooding. Link State Protocol Concept

2/16/2008. Outline Computer Networking Lecture 11 Routing. Sending Link States by Flooding. Link State Protocol Concept //8 Outline - omputer Networking Lecture Routing Link tate OP Peter teenkiste epartments of omputer cience and Electrical and omputer Engineering IP Multicast ervice asics - Networking, pring 8 http://www.cs.cmu.edu/~dga/-/8

More information

Link layer: introduction

Link layer: introduction Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,

More information

Revision of Previous Lectures

Revision of Previous Lectures Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture

More information

This Lecture. BUS Computer Facilities Network Management. Information Sharing. Local Area Network

This Lecture. BUS Computer Facilities Network Management. Information Sharing. Local Area Network This Lecture US3150 - omputer Facilities Network Management Local rea Network (LN). LN applications. LN topologies: us, Tree, Ring, Faculty of Information Technology Monash University Star. LN protocol

More information

SWITCHING, FORWARDING, AND ROUTING

SWITCHING, FORWARDING, AND ROUTING SWITCHING, FORWARDING, AND ROUTING George Porter Oct 4 and 9, 2018 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons license

More information

DSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016

DSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016 estination Sequenced istance Vector (SV) Routing [Perkins94] SV: Proactive SV is a proactive protocol means it maintains up-to-date routing information for all available nodes in the network. No extra

More information

Page 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

Page 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols 173/S152 Proactive Protocols MNT Unicast Routing Proactive Protocols OLSR SV ybrid Protocols Most of the schemes discussed so far are reactive Proactive schemes based on distance vector and link state

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.1: Internetworking Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer

More information

Lecture 10: Internetworking"

Lecture 10: Internetworking Lecture 10: Internetworking" CSE 123: Computer Networks Alex C. Snoeren HW 2 due NOW! Lecture 10 Overview" Spanning Tree Internet Protocol Service model Packet format 2 Spanning Tree Algorithm" Each bridge

More information

Link Layer: CSMA/CD, MAC addresses, ARP

Link Layer: CSMA/CD, MAC addresses, ARP Link Layer: CSM/CD, MC addresses, RP Smith College, CSC 249 March 29, 208 MC ddress q 32-bit IP address: network-layer address used to get datagram to destination IP subnet q MC (or LN, physical, thernet,

More information

Unit 8. Spanning Tree protocol, Virtual LANs (VLANs) and Access Networks

Unit 8. Spanning Tree protocol, Virtual LANs (VLANs) and Access Networks nit 8 panning ree protocol, Virtual s (Vs) and ccess etworks panning ree Protocol (P) Designed to prevent bridging loops ach bridge has unique D consisting of Priority + address n power up the bridge or

More information

TOC: Switching & Forwarding

TOC: Switching & Forwarding Walrand Lecture TO: Switching & Forwarding Lecture Switching & Forwarding EES University of alifornia Berkeley Why? Switching Techniques Switch haracteristics Switch Examples Switch rchitectures Summary

More information

Slides for Chapter 3: Networking and Internetworking

Slides for Chapter 3: Networking and Internetworking Slides for hapter 3: Networking and Internetworking From oulouris, ollimore and Kindberg istributed Systems: oncepts and esign dition 4, Networking Issues () Performance: Latency (time between send and

More information

Advanced Computer Networks

Advanced Computer Networks istance Vector dvanced omputer Networks Internal routing - distance vector protocols Prof. ndrzej uda duda@imag.fr ontents Principles of internal routing istance vector (ellman-ford) principles case of

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)

More information

Lecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions?

Lecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions? Lecture 7 Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions? Thursday, September 15 CS 475 Networks - Lecture 7 1 Outline Chapter

More information

Connecting LANs. Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro ) CSE 3213, Fall Instructor: N. Vlajic

Connecting LANs. Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro ) CSE 3213, Fall Instructor: N. Vlajic 1 Connecting LANs Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro + 6.11.1) CSE 3213, Fall 20105 Instructor: N. Vlajic Connecting Devices 2 Why Connecting Devices in LANs? (1) LANs do not normally

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

CMPE 150 Winter 2009

CMPE 150 Winter 2009 CMPE 150 Winter 2009 Lecture 9 February 3, 2009 P.E. Mantey CMPE 150 -- Introduction to Computer Networks Instructor: Patrick Mantey mantey@soe.ucsc.edu http://www.soe.ucsc.edu/~mantey/ / t / Office: Engr.

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

HWP2 Application level query routing HWP1 Each peer knows about every other beacon B1 B3

HWP2 Application level query routing HWP1 Each peer knows about every other beacon B1 B3 HWP2 Application level query routing HWP1 Each peer knows about every other beacon B2 B1 B3 B4 B5 B6 11-Feb-02 Computer Networks 1 HWP2 Query routing searchget(searchkey, hopcount) Rget(host, port, key)

More information

Previous Lecture. Link Layer & Network Layer. Link Layer. This Lecture. Framing. Sending bits. Chapter 7.C and 7.D

Previous Lecture. Link Layer & Network Layer. Link Layer. This Lecture. Framing. Sending bits. Chapter 7.C and 7.D hapter 7. and 7. Previous Lecture Layer & Network Layer The network is organized into layers Prof. ina Katabi Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari alakrishnan,

More information

Data Communications. Connecting Devices

Data Communications. Connecting Devices Data Communications Connecting Devices Connecting Devices Networks do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, or segments of LANs, we use

More information

Request for Comments: S. Gabe Nortel (Northern Telecom) Ltd. May Nortel s Virtual Network Switching (VNS) Overview

Request for Comments: S. Gabe Nortel (Northern Telecom) Ltd. May Nortel s Virtual Network Switching (VNS) Overview Network Working Group Request for Comments: 2340 Category: Informational B. Jamoussi D. Jamieson D. Williston S. Gabe Nortel (Northern Telecom) Ltd. May 1998 Status of this Memo Nortel s Virtual Network

More information

Transparent Bridging and VLAN

Transparent Bridging and VLAN Transparent Bridging and VLAN Plug and Play Networking (C) Herbert Haas 2005/03/11 Algorhyme I think that I shall never see a graph more lovely than a tree a graph whose crucial property is loop-free connectivity.

More information

The Spanning Tree Protocol

The Spanning Tree Protocol Università Ca Foscari di Venezia Dipartimento di Informatica Corso di Sistemi Distribuiti 2009 Presentation outline Introduction 1 Introduction Local internetworking Motivations 2 High level description

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Unicast Routing in Mobile Ad Hoc Networks

Unicast Routing in Mobile Ad Hoc Networks Unicast Routing in obile d oc etworks Routing problem 1 2 Responsibility of a routing protocol etermining an optimal way to find optimal routes etermining a feasible path to a destination based on a certain

More information

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points

Next Steps Spring 2011 Lecture #18. Multi-hop Networks. Network Reliability. Have: digital point-to-point. Want: many interconnected points Next Steps Have: digital point-to-point We ve worked on link signaling, reliability, sharing Want: many interconnected points 6.02 Spring 2011 Lecture #18 multi-hop networks: design criteria network topologies

More information

More on Link Layer. Recap of Last Class. Interconnecting Nodes in LAN (Local-Area Network) Interconnecting with Hubs. Computer Networks 9/21/2009

More on Link Layer. Recap of Last Class. Interconnecting Nodes in LAN (Local-Area Network) Interconnecting with Hubs. Computer Networks 9/21/2009 More on Link Layer Kai Shen Recap of Last Class Ethernet dominant link layer technology for local-area l networks Ethernet frame structure Ethernet multiple access control CSMA/CD, exponential back-off

More information

Routing in Ad-hoc Networks

Routing in Ad-hoc Networks 0/3/ COMP 635: WIRELESS & MOILE COMMUNICTIONS Routing in d-hoc Networks Jasleen Kaur Fall 0 Infrastructure-less Wireless Networks Standard Mobile IP needs an infrastructure Ø Home gent/foreign gent in

More information

802.1AS Fast Master Clock Selection

802.1AS Fast Master Clock Selection 802.1AS Fast Master Clock Selection Moving 802.1AS closer to RSTP Version 2 Norman Finn Cisco Systems 1 Introduction 2 Introduction IEEE 1588 networks that contain transparent clocks and the current draft

More information

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5 ynamic Source Routing (SR) [Johnson96] S 6811 : Lecture 5 d Hoc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation Loop freedom

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP

0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP epartment of lectrical ngineering and omputer Sciences University of alifornia erkeley '!$$( network defined over another set of networks The overlay addresses its own nodes Links on one layer are network

More information

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols d oc Routing d-hoc Routing rvind Krishnamurthy all 2003 Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems

More information

TCP/IP Networking. Part 3: Forwarding and Routing

TCP/IP Networking. Part 3: Forwarding and Routing TP/IP Networking Part 3: Forwarding and Routing Routing of IP Packets There are two parts to routing IP packets:. How to pass a packet from an input interface to the output interface of a router ( IP forwarding

More information

Routing. Effect of Routing in Flow Control. Relevant Graph Terms. Effect of Routing Path on Flow Control. Effect of Routing Path on Flow Control

Routing. Effect of Routing in Flow Control. Relevant Graph Terms. Effect of Routing Path on Flow Control. Effect of Routing Path on Flow Control Routing Third Topic of the course Read chapter of the text Read chapter of the reference Main functions of routing system Selection of routes between the origin/source-destination pairs nsure that the

More information

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018 S 3: omputer Networks 3: Routing lgorithms November, 08 Last class NT: Network ddress Translators: NT is mostly bad, but in some cases, it s a necessary evil. IPv6: Simpler, faster, better Tunneling: IPv6

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra)

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra) ontents ÉOL POLYTHNIQU ÉÉRL LUSNN! 1. Link state flooding topology information finding the shortest paths (ijkstra)! 2. Hierarchical routing with areas! 3. OSP Link State Routing database modelling neighbor

More information

Deployment of IGRP/EIGRP

Deployment of IGRP/EIGRP 1 eployment of IGRP/EIGRP Session 2 Presentation_I.scr 1 Understanding EIGRP Understanding and deploying EIGRP is like driving a car 3 genda Fundamentals of EIGRP UL Summarization and Load alancing EIGRP/IGRP

More information

Review: Routing in Packet Networks Shortest Path Algorithms: Dijkstra s & Bellman-Ford. Routing: Issues

Review: Routing in Packet Networks Shortest Path Algorithms: Dijkstra s & Bellman-Ford. Routing: Issues Review: Routing in Packet Networks Shortest Path lgorithms: ijkstra s & ellman-ford Routing: Issues How are routing tables determined? Who determines table entries? What info used in determining table

More information

Configuring your VLAN. Presented by Gregory Laffoon

Configuring your VLAN. Presented by Gregory Laffoon Configuring your VLAN Presented by Gregory Laffoon 1 Overview of Networking Terms Networking Terms Overview OSI Model Defines a networking framework for implementing protocols in seven layers Control is

More information

Chapter 5. Spanning Tree Protocol (STP) Part I

Chapter 5. Spanning Tree Protocol (STP) Part I Chapter 5 Spanning Tree Protocol (STP) Part I CCNA3-1 Chapter 5-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.

More information