Arhitecturi și Protocoale de Comunicații (APC) Rețele locale (I)
|
|
- Louise Williams
- 5 years ago
- Views:
Transcription
1 Arhitecturi și Protocoale de Comunicații (APC) Rețele locale (I)
2 Outline Shared media LANs Classes of (MAC) protocols, standards. CSMA/CD (Ethernet). Bridged/Switched LANs Types of bridges, standards. Transparent bridges: Learning and Forwarding. Spanning Tree Protocol. LAN switches. LAN infrastructure (annex) 2 nd Part: Wireless LANs Introduction to IEEE WLANs. Octavian Catrina 2
3 Data Link layer (review) LANs: DL connectivity using shared media and LAN switching WANs: DL connectivity using pointto-point links and WAN switching Hub Switches 6 Router Data Link layer (DL) to control the data transfer on physical links: framing, addressing, error control,... Medium Access Control (MAC) to coordinate the access to shared physical transmission media. Octavian Catrina 3... DL/MAC PHY Medium... DL/MAC PHY
4 Data link layer: main functions DL/MAC addresses Identify stations attached to same link. Flat address space. Framing Define a PDU (frame) format that: Allows receivers to determine frame boundaries in the received bit stream. Incorporates control information needed by the data link layer protocol (addresses, error detection code, etc). Error control Detect/correct frames altered during transmission. Medium access control Coordinate the access to shared physical transmission media. Multiplexing and switching Various technologies for LANs (e.g., switched Ethernet) and WANs (e.g., Frame Relay, ATM). Octavian Catrina 4
5 Shared Media LANs MAC protocols for wired LANs
6 Classes of MAC protocols Non-deterministic access Network devices contend for shared medium access. MAC protocol provides contention rules. Collisions can occur during contention. Access time is not predictable/scheduled. Access delay/efficiency: Some time is lost with device contention (collisions). Simple, robust, cheap. Deterministic access Network devices take turns for shared medium access. MAC protocol provides coordination rules. Collisions do not occur. Access times can be scheduled/predictable. Access delay/efficiency: Some time is lost for device coordination. More complex, expensive. Octavian Catrina 6
7 MAC protocols IEEE 802 standards (examples) 802.3: CSMA/CD ( Ethernet) Carrier Sense Multiple Access with Collision Detection. Non-deterministic access, contention MAC protocol : Token Ring; 802.4: Token Bus (historical) Deterministic access, token rotation MAC protocol : Wireless LANs Non-deterministic access using CSMA/CA - CSMA with Collision Avoidance. Deterministic access using polling : 100 VG-AnyLAN (historical) Deterministic access, round-robin scheduling protocol. ANSI/ISO standard (ISO 9314) (historical) FDDI (Fiber Distributed Digital Interface) Deterministic access, timed token rotation protocol. Octavian Catrina 7
8 OSI Physical OSI Data Link CSMA-CD: IEEE Token Ring: IEEE Wireless LAN: IEEE and many others Physical MAC sublayer LLC sublayer Scope IEEE LAN standards For each LAN type: MAC sublayer + PHY layer. Common Logical Link Control (LLC) sublayer: LAN interconnection (bridges/switches): MAC sublayer Framing, addressing, error detection, MAC protocols. Connectionless unreliable service. LLC sublayer Often empty in IP networks... Provides a common DL service interface for all MAC types and protocols for more service types: best effort, reliable connection oriented and connectionless. Logical Link Control LLC: IEEE Octavian Catrina 8
9 ALOHA Non-deterministic access Transmit at will. Towards CSMA/CD (Ethernet) Very low efficiency (up to 18% channel utilization). CSMA: Carrier Sense Multiple Access Transmit only when sensing the medium idle. Collisions still possible due to propagation delay. Efficiency is still quite low. CSMA/CD: CSMA with Collision Detection Adding collision detection allows: (1) interruption of failed transmission and (2) immediate recovery by retransmission. Most widespread technology for wired shared media LANs. Octavian Catrina 9
10 CSMA/CD principle Transmit only when sensing medium idle (CSMA). Detect collision (CD), abort transmission, retry later. A backoff 12: A looses! t 0 t B d=c t 0-2 t 0+ backoff 02: B wins! c = signal propagation speed. d = distance (cable length). = signal propagation delay. t Time elapsed from transmission start until collision detection: 2. Maximum duration of a transmission in case of collision 2. After a collision, the stations must defer the attempts to transmit for a random time interval (backoff) to avoid systematic collisions. Octavian Catrina 10
11 More insight Ensuring collision detection Minimum frame transmission duration: T min > 2. Transmit brief jamming signal after detecting collision. Solving contention Defer retransmission after collision with random delay: backoff. Backoff delay is random multiple N of 2 time slots. Ensures the transmitter with shortest backoff delay wins. Range of N for K consecutive collisions is [0, 2 min(k, 10) -1]. Binary exponential backoff. Adapts backoff delay to load, ensures that contention ends at high load. Reduces collision probability when many senders are active by spreading retransmissions over longer intervals. Limit the number of retries: K max = 16. CSMA/CD efficiency Efficient operation when contention duration (multiple of 2) is much shorter than transmission duration (T): /T << 1. Efficiency decreases as delay (distance) and/or data rate increase. Octavian Catrina 11
12 Ethernet frame format (IEEE 802.3) octets: PA SFD DA SA L/T Data Pad FCS octets covered by FCS PA: Preamble - synchronization ( ) SFD: Start of Frame Delimiter ( ) DA: Destination Address SA: Source Address L/T: Length of data field (octets) if Else, payload type. Pad: Extra bits added when the frame has less than 64 octets. FCS: Frame Check Sequence (CRC-32.) Baseband transmission. MAC addresses: bits: I/G U/L 46-bit address I/G = 0/1 - individual/group (multicast). U/L = 0/1 - local/global administered. 0xFFFFFFFF = broadcast address. Assumed maximum round-trip propagation delay: 2 = 51.2 s Octavian Catrina 12
13 Examples of Ethernet frames Note: Padding is at the end of the frame MAC Length + Padding + LLC + Payload MAC Type + Padding + Payload MAC Type + Payload Octavian Catrina 13
14 CSMA/CD protocol overview Wait for data to send. Format frame Transmission Reception Y Carrier sense ON? N Wait inter-frame gap. Start frame transmission Collision detected? Y Abort frame transmission. Transmit jam signal (32 bits). Increment collision counter K N Complete transmission Status: Done N Incoming signal detected? Y Set carrier sense signal ON. Bit synchronization. Wait for SFD. Receive frame. FCS and frame size OK? Y N K > 16? N Y Backoff: wait N slots, N = random (0, 2 min (K, 10) -1) Discard frame. Status: Attempt limit exceeded Matching dest. address? Y Deliver frame to higher sub-layer N Discard frame. Octavian Catrina 14
15 Ethernet: A success story First Ethernet Xerox (1970's), joined later by DEC and Intel. 1-2 Mbps. Deployed since the beginning of the 1980s. 10 Mbps - Ethernet (IEEE 802.3, 1985) 10BASE5/10BASE2: bus topology, thick/thin coaxial. 10BASE-T/FX: star topology, UTP/optical fiber. Switched Ethernet - early 1990s. 100 Mbps - Fast Ethernet (1996) 100BASE-TX/FX: star, UTP(STP)/optical fiber Mbps - Gigabit Ethernet (1999) 1000BASE-FX/CX/T: star, optical fiber/copper(stp/utp). Normally used in switched Ethernet LANs/MANs. Still supports CSMA/CD. 10 Gbps Ethernet in Switched Ethernet LANs/MANs. 100 Gbps Ethernet in 2010 Octavian Catrina 15
16 Token Ring overview (historical) Outline Logical ring topology with star wiring. One-way links, active interfaces. Copper (shielded twisted pair) or optical fiber cable. 4/16/100 Mbps, < 260 stations, < 100 m between stations. MAC protocol Token rotation (token passing) protocol. Real-time traffic support: - Limited access delay by limited token holding time. - Priorities. Interface Token Concentrator Octavian Catrina 16
17 Token rotation protocol Token Ring interface Repeat mode: Transmit mode: Rx Rx Tx Tx Octavian Catrina 17
18 Shared media: Performance issues Frame transfer delay Medium access delay + Transmission duration + Propagation delay Specific component: medium access delay. Examples: CSMA/CD contention, Token rotation. Main problem: fast increase with traffic load. Throughput Time sharing of the medium Average throughput for each station is a fraction of the shared medium bandwidth.... DL/MAC PHY PHY Repeater PHY... DL/MAC PHY Shared media domain Shared media domain Extended shared media domain Frames delivered by flooding Octavian Catrina 18
19 Shared media: benefits and limitations Benefits Cost effective LAN connectivity. High data rate at end systems and low transfer delay for the lowest cost. Limitations Does not scale up for larger LANs and higher medium bandwidth. More stations Less bandwidth per station. Larger network and/or higher bandwidth decrease of medium bandwidth utilization: larger time fraction spent with transmission coordination by MAC protocol. Higher traffic Rapid increase of medium access delay. Octavian Catrina 19
20 Scalable LAN connectivity Meeting bandwidth requirements Increase medium bandwidth. Limited by data transmission technology, cost, MAC protocol efficiency. Improve bandwidth utilization. The only scalable solution. Rely on Data Link or/and Network layer functions for scalable, bandwidth-efficient connectivity. Towards scalable solutions in LANs Limit shared media domains. Segmentation with bridges, switches or routers. Other issues: Limit MAC broadcasts, use full-duplex instead of half-duplex, optimize paths, add redundant paths with load sharing, etc. Octavian Catrina 20
21 Switched LANs Bridges, Ethernet switches
22 LAN connectivity using bridges Bridges were introduced in the late 1980s to interconnect shared media LAN segments, at MAC (sub)layer. A bridge distinguishes inter-segment frames from intra-segment (local) frames, based on MAC addresses. Forwards inter-segment frames toward the destination. Filters (does not forward) intra-segment (local) frames. Inter-segment Forward Intra-segment No forward... Bridge DL/MAC PHY MAC PHY MAC PHY DL/MAC PHY Octavian Catrina 22
23 Transparent vs. Source routing bridges Transparent bridge Design goal: transparent interconnection. Stations ignore the presence of bridges. No HW/SW changes in stations: plug and play. Bridges discover attached stations and only forward inter-segment traffic. Standard: IEEE 802.1D-2004 (supersedes 802.1D-1990, 1998). Source routing bridge Design goal: optimal paths and load sharing. Source stations discover paths to destinations. Frame headers carry a path description. Bridges forward frames according to the path in the header. Historical: IEEE (Token Ring), ISO (FDDI). Transparent bridges were widely deployed in Ethernet LANs. They rapidly won the competition with source routing bridges, which were used only in Token Ring LANs. Octavian Catrina 23
24 Transparent bridges The bridge learns the location of the stations relative to its ports from the source MAC address of the received frames. This information is stored in a forwarding table and used to decide what frames to forward and where. Forward Destination at another port. Filter Destination at the same port. Flood Destination unknown or broadcast frame or multicast frame Forward Flood Filter Octavian Catrina 24
25 Learning and forwarding (1) Octavian Catrina 25
26 Learning and forwarding (2) Adaptation to topology changes What happens if station 1 is moved to the rightmost segment? It becomes unreachable (until it sends some frame)! The bridge must be able to automatically update the forwarding table to network topology changes. A timestamp is stored whenever a table entry is created or updated. Entries older than a preset max age are discarded. Octavian Catrina 26
27 Learning and forwarding (3) Bridge Architecture Receive & store frame on port P Frame buffer memory MAC Learning Logic Forwarding Table (FT) MAC Address Port Age Frame buffer memory MAC Learn SA Learn: Add FT entry: SA, port P, age No Read Source Address (SA) Is SA in FT? Yes Read Destination Address (DA) PHY Forwarding Logic PHY No Is DA broadcast? Yes Frame Frame Is DA in FT? Yes Read port for DA from FT = Q No Flood frame No Is P = Q? Yes Forward frame to port Q Filter (discard) frame Flood: Forward on all ports except P Octavian Catrina 27
28 Loops in bridged LANs Loops: How do they occur? Intended interconnections: LAN topology with alternate paths, able to maintain connectivity in case of failure (fault tolerance). Involuntary/accidental interconnections. Transparent bridges and loops In this example, the frame is flooded because its destination address is not in the table. Similar behavior for broadcast destination address. Frame from 1 to 2 12 The frame loops and proliferates! up 1 up DA Port 1 down DA Port 1 down Learn station 1. Flood. 12 Learn station Flood. Double delivery Learn station 1. Flood Learn station 1. Flood. Octavian Catrina 28
29 Loop-free full connectivity Spanning tree Sub-graph providing loop-free full connectivity. Spanning Tree Protocol (STP) STP allows transparent bridges to: Discover a spanning tree in the physical topology. Reduce the physical topology to a spanning tree by disabling some bridge ports. Monitor connectivity and enable/disable ports to adapt to network changes or failures. STP implements a distributed algorithm for determining and maintaining a spanning tree. Bridges communicate using control messages called BPDU (Bridge Protocol Data Units). Example of BPDU in slide 13. Octavian Catrina 29 L3 L4 1 L3 L2 3 5 L1 L L6 L4 6 L5 L6 Physical topology Root L1 L5 Spanning tree: Connects the root bridge to all LANs and all bridges on shortest paths. Provides loop-free, symmetric (two-way) connectivity. 6 Spanning tree
30 STP: Algorithm overview Bridge ID: Priority + MAC address. Cost assigned to each port: What "costs" to send a frame through that port (inv. of link bandwidth). Elect the root bridge: The bridge with the lowest bridge ID. Find the root path cost (RPC) of each port: The lowest path cost to reach the root by that port. Select the root port (R) of each bridge: Port with the lowest RPC. Select the designated bridge for each LAN segment: Bridge with the lowest RPC. The port of that bridge connected to the LAN is marked as designated port (D). Block () all the other ports (i.e., which are not R or D). Octavian Catrina 30 L4 R L1 D 1 RPC=0 R 1 RPC= D 1 Root 2 3 L5 2 2 D 3 RPC=0 3 RPC=3 L2 R 1 RPC=2 1 R 1 RPC=1 R 2 RPC= D RPC=3 L6 2 2 D 1 RPC=3 L3 1 RPC= D 2 RPC=2 Bridge identifiers (1, 2,...) Port identifiers (1, 2,...)
31 STP: Protocol overview BPDU: Contains the ID of the root assumed by the sender, the RPC, the sender's ID,... BPDU flow: BPDUs are multicast to all bridges on a LAN segment. The root bridge sends BPDUs periodically. Designated bridges relay BPDUs on their D ports. At power on: Initially, any bridge issues BPDUs claiming to be root. Eventually, only the elected root still issues BPDUs and the designated bridges relay them. Upon failure (worst case): The periodic BPDUs do not reach the bridge any more. After a preset time it restarts the spanning tree algorithm. Octavian Catrina 31 R L1 D 1 RPC=0 R 1 RPC=1 1 (1,0,1) (1,1,2) 1 2 D 1 Root 2 3 L5 2 2 D 3 RPC=0 3 RPC=3 L2 R 1 RPC=2 1 R 1 RPC=1 R 2 RPC= (1,1,3) (1,2,4) 1 D RPC=3 L6 2 2 D 1 RPC=3 L3 1 RPC=2 1 1 (1,2,5) 5 2 L4 D 2 RPC=2 BPDUs transmitted on D ports after convergence. Main info: Root Bridge ID, My RPC, My Bridge ID.
32 High performance multiport bridge Layer 2 (LAN) switches Parallel architecture, hardware implementation Multiple frames can be forwarded at the same time. Very low frame forwarding latency by early table lookup (next slide). Typically one station per switch port No more shared transmission media full duplex operation is possible. Asymmetric switching Ports can have different bit rates (fast ports for servers and inter-switch links). Octavian Catrina 33
33 Switching modes Store-and-forward switching The switch starts forwarding after receiving the complete frame. Frame forwarding delay (if no queuing): T = L/R. Delay is long and varies with frame length. All errors filtered. Preamble SFD DA SA Len Data FCS Cut-through Fragment-free Store-and-Forward Cut-through switching A switch can start forwarding after receiving the frame's DA. Usually: Start forwarding after receiving F = 64 octets. "Fragment-free": filters frames < 64 octets (collision fragments). Frame forwarding delay (if no queuing): T = F/R. Delay is very short and constant. Bit errors not filtered. Forwarding starts before receiving FCS. Octavian Catrina 34
34 Final example Physical topology. All links have the same cost. STP Bridge IDs are B1, B2, B8 and B1 < B2 < < B8. Root B B B B S Active topology created by STP and delivery of the frame X S. Designated Port: D Root Port: R Blocked Port Root B1 4 D R 1 2 B3 D D D D 1 1 D R B D 3 4 D D D D R 1 2 B4 3 D D D D S B1 Adr. Port S 1 X SA=X, DA=S B5 B6 B7 B We assume the following initial contents of the forwarding tables: B2 Adr. Port S 5 B3 Adr. Port Y 4 B4 Adr. Port S 1 SA=X, DA=S Bridge actions for the delivery of the frame X S and final contents of the forwarding tables: B1 Learn Fwd Adr. Port S 1 X 4 R R R R B5 B6 B7 B D D D D D D D D X B2 Learn Fwd Adr. Port S 5 X 1 B3 Learn Flood Adr. Port Y 4 X 6 B4 Nothing Adr. Port S 1 B5 Adr. Port X 4 B6 Adr. Port B7 Adr. Port Y 4 B8 Adr. Port Z 4 B5 Flood Adr. Port X 4 B6 Learn Flood Adr. Port X 1 B7 Learn Flood Adr. Port Y 4 X 1 B8 Learn Flood Adr. Port Z 4 X 1 Octavian Catrina 35
35 Bridges: benefits and limitations Benefits Cost effective solution for LAN connectivity with isolation of shared media segments. Minimal installation and maintenance effort. LAN connectivity independent of Network layer protocol. Limitations No broadcast control: single MAC broadcast domain. Imperfect filtering: flooding if destination unknown. No optimal paths, no load sharing (for transparent bridges). Transfer delay increases (for store and forward operation). Does not scale up for large inter-networks. 1/10 Gigabit Ethernet High performance and cost effective solutions for campus network backbone. Also, attractive solution for MANs. Octavian Catrina 36
36 Evolution of bridged LAN standards IEEE 802.1D MAC Bridges First standard for transparent bridges was 802.1D Various amendments have been incorporated in 2 revisions of the 802.1D standard, issued in 1998 and Amendment 802.1w-2001 specified Rapid STP (RSTP). RSTP was introduced to replace the original STP and provide much faster convergence after topology changes (from seconds to a few seconds in the worst case). Current version of the MAC Bridges standard is 802.1D IEEE 802.1Q VLAN Bridges Support for Virtual LANs was introduced in 802.1Q Development continued with a long series of amendments and 2 revisions of the standard, in 2005 and On-going work. Current version of the VLAN Bridges standard is 802.1Q Octavian Catrina 37
37 Towards more efficient connectivity Inefficient interconnection in traditional bridged LANs Traditional bridges can handle redundant paths in the physical topology, to provide fault tolerance. However, the spanning tree active topology cannot provide optimal paths and load balancing on alternate paths. Several recent developments aim at providing more efficient connectivity in bridged LANs (at MAC layer), using techniques borrowed from IP routing protocols. Shortest Path Bridging (SPB) Specified in 2012 by the IEEE, in amendment 802.1aq Transparent Interconnection of Lots of Links (TRILL) Proposed by Radia Perlman, specified in by the IETF, in RFC 5556, 6325, 6326, 6327, etc. Competing solutions supported by different vendors Octavian Catrina 38
38 Annex LAN Infrastructure
39 Star topology: Catchment area Transmission range Depends on physical medium characteristics, data rate, transmission technology, etc. Standardized (IEEE 802, EIA/TIA-568). Catchment area Area around the hub within transmission range. Example Catchment area for Ethernet 10BASE-T and 100Base-TX LANs (UTP). Octavian Catrina 40
40 Star topology: EIA/TIA 568/569 cabling < 3m < 6m < 90m Patch panel Wiring closet Specially designated room for wiring a data (or voice) network. Center of star topology. Horizontal cabling Cabling extending from a wiring closet to workstations. Octavian Catrina 41
41 Extended star topology: Multi-story building MDF: Main Distribution Facility Primary communications room (wiring closet) for a building or campus. Central point (root) of an extended star topology. IDF: Intermediate Distribution Facility Secondary communications room, lower hierarchy level in an extended star topology. POP: Point-Of-Presence Communications room serving as point of interconnection with local telecom network. Octavian Catrina 42
42 Extended star: Multi-building campus Octavian Catrina 43
43 Extended star: EIA/TIA 568/569 cabling Wiring closet HCC: Horizontal Cross Connect (patch panels). VCC: Vertical Cross Connect (patch panels). Wiring closet Octavian Catrina 44
Redes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationPart3. Local Area Networks (LAN)
Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationLocal Area Network Overview
Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and
More informationComputer Networks Principles LAN - Ethernet
Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2
More informationAccess Technologies! Fabio Martignon
Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several
More informationIntroductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.
Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationIEEE 802 LANs SECTION C
IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison
More informationChapter 15 Local Area Network Overview
Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More informationPrinciples behind data link layer services
Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationIEEE standards for local area networks
IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationLocal Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring
Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link
More informationGoal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste
Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a
More informationChapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution
More informationObjectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed
More information! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks
Local Area Networks A Local Area Netw ork is a communications netw ork that provides interconnection of a variety of data communicating devices w ithin a small area. Typical Characteristics! High Data
More informationLecture 05 Chapter 16 High Speed LANs
NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More informationData and Computer Communications. Chapter 11 Local Area Network
Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationThe random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure
Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationChapter 11 in Stallings 10 th Edition
Local Area Network Overview Chapter 11 in Stallings 10 th Edition CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large
More informationIntroduction to Ethernet. Guy Hutchison 8/30/2006
Introduction to Ethernet Guy Hutchison 8/30/2006 What is Ethernet? Local area transport protocol Layer 2 of the OSI stack Zero/minimal configuration Low-cost, high performance Best-effort delivery Original
More informationInternet Architecture and Protocol
Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport
More informationLecture 6: Example LAN: Ethernet
Lecture 6: Example LAN: Ethernet Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Network Types Local Area Networks (LANs):privately-owned networks
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationHigh Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2
High Speed LANs CS420/520 Axel Krings Page 1 High Speed LANs Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs CS420/520 Axel Krings Page 2 1 Why High Speed LANs? Office
More informationLAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science
1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we
More informationEthernet. Introduction. CSE 3213 Fall 2011
Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationIntroduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control
168 430 Computer Networks Chapter 16 High Speed LANs Introduction Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs Why High Speed LANs? Office LANs used to provide
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationCCNA Exploration Network Fundamentals. Chapter 09 Ethernet
CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services
More informationChapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)
Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial
More informationEthernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers
Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationCompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,
More informationLAN PROTOCOLS. Beulah A AP/CSE
LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety
More informationEthernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub
Campus Network Design Thana Hongsuwan Ethernet Hub 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 1-2 Sending and receiving Ethernet frames
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationPhysical and Data Link layers
Physical and Data Link layers Youki Kadobayashi Graduate School of Science Nara Institute of Science and Technology Physical Layer All rights reserved. 2 Types of transmission medium! Cables Optical fiber
More informationEECS 122, Lecture 7. Kevin Fall Jean Walrand
EECS 122, Lecture 7 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu : Outline Typical Setup Names Physical Layer Frame Fast Ethernet; Gigabit Ethernet 10Base5 Efficiency of CSMA/CD
More informationMedium Access Control Sublayer
Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA
More informationIntroduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and
High Speed LANs 3BA33 David Lewis 2 nd Semester 2006-07 3BA33 D.Lewis 2007 1 Characteristics of High Speed LANS 3BA33 D.Lewis 2007 3 Introduction Fast Ethernet and Gigabit Ethernet Fibre Channel High-speed
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!
CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework
More information2. LAN Topologies Gilbert Ndjatou Page 1
2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers
More informationLAN Systems. Bus topology LANs
Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong
More informationIntroduction to LAN Protocols
CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various
More informationZarządzanie sieciami telekomunikacyjnymi
Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Four data rates are
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationCS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017
CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology
More informationPart 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross
Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,
More informationSwitching and Forwarding Reading: Chapter 3 1/30/14 1
Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any
More informationLayer 2 functionality bridging and switching
Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How
More information10- and 100-Mbps Ethernet
Ethernet Basics 10-Mbps Ethernet Three 10-Mbps Ethernet standards: 10BASE5 10BASE2 10BASE-T 10BASE2 and 10BASE5 were around more than 20 years and have been replaced by newer alternatives 10BASE-T s use
More informationLAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic
1 LAN Protocols Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8 CSE 3213, Fall 2015 Instructor: N. Vlajic What is LAN? 2 Local Area Network (LAN) properties private ownership freedom to choose/change/upgrade
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More informationContents. Introduction to Networking. Preface...i. Introduction... xix
Contents Introduction to Networking Introduction to Networking Preface...i Key Topics...i Course Objectives...ii Pedagogical Features...ii Learning Objectives, Unit Summaries, Discussion Questions, and
More informationCommunication (III) Kai Huang
Communication (III) Kai Huang Ethernet Turns 40 12/17/2013 Kai.Huang@tum 2 Outline Bus basics Multiple Master Bus Network-on-Chip Examples o SPI o CAN o FlexRay o Ethernet Basic OSI model Real-Time Ethernet
More informationSome portions courtesy Srini Seshan or David Wetherall
CSE 123 Computer Networks Fall 2009 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Misc Homework solutions have been posted I ll post a sample
More informationIntroduction to Computer Networks. IEEE Ethernet
Introduction to Computer Networks IEEE 802.3 Ethernet All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,
More informationEthernet. Networks: Ethernet 1
Ethernet Networks: Ethernet 1 Ethernet [DEC, Intel, Xerox] 1-persistent, CSMA-CD with Binary Exponential Backoff Manchester encoding Networks: Ethernet 2 Ethernet [operational in 1974] Initially 3 Mbps
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for
More informationRaj Jain. The Ohio State University Columbus, OH
Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 3-1 Overview ISO/OSI Reference Model TCP/IP Reference Model Differences between ISO and TCP Ethernet/IEEE 802.3 LANs Interconnecting
More informationLecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More information1. Data Link Layer Protocols
1. Data Link Layer Protocols Purpose of the Data Link Layer The Data Link Layer Purpose of the Data Link Layer Data Link Sublayers Network LLC Sublayer Data Link Physical MAC Sublayer 802.3 Ethernet 802.11
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationDirect Link Communication II: Wired Media. Multi-Access Communication
Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used
More informationTest Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair
Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/
More informationCompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 7: Switching technologies Chapter 3.1 Xiaowei Yang xwy@cs.duke.edu Types of switching Datagram Virtual circuit Source routing Today Bridges and LAN switches
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More information