Arhitecturi și Protocoale de Comunicații (APC) Rețele locale (I)

Size: px
Start display at page:

Download "Arhitecturi și Protocoale de Comunicații (APC) Rețele locale (I)"

Transcription

1 Arhitecturi și Protocoale de Comunicații (APC) Rețele locale (I)

2 Outline Shared media LANs Classes of (MAC) protocols, standards. CSMA/CD (Ethernet). Bridged/Switched LANs Types of bridges, standards. Transparent bridges: Learning and Forwarding. Spanning Tree Protocol. LAN switches. LAN infrastructure (annex) 2 nd Part: Wireless LANs Introduction to IEEE WLANs. Octavian Catrina 2

3 Data Link layer (review) LANs: DL connectivity using shared media and LAN switching WANs: DL connectivity using pointto-point links and WAN switching Hub Switches 6 Router Data Link layer (DL) to control the data transfer on physical links: framing, addressing, error control,... Medium Access Control (MAC) to coordinate the access to shared physical transmission media. Octavian Catrina 3... DL/MAC PHY Medium... DL/MAC PHY

4 Data link layer: main functions DL/MAC addresses Identify stations attached to same link. Flat address space. Framing Define a PDU (frame) format that: Allows receivers to determine frame boundaries in the received bit stream. Incorporates control information needed by the data link layer protocol (addresses, error detection code, etc). Error control Detect/correct frames altered during transmission. Medium access control Coordinate the access to shared physical transmission media. Multiplexing and switching Various technologies for LANs (e.g., switched Ethernet) and WANs (e.g., Frame Relay, ATM). Octavian Catrina 4

5 Shared Media LANs MAC protocols for wired LANs

6 Classes of MAC protocols Non-deterministic access Network devices contend for shared medium access. MAC protocol provides contention rules. Collisions can occur during contention. Access time is not predictable/scheduled. Access delay/efficiency: Some time is lost with device contention (collisions). Simple, robust, cheap. Deterministic access Network devices take turns for shared medium access. MAC protocol provides coordination rules. Collisions do not occur. Access times can be scheduled/predictable. Access delay/efficiency: Some time is lost for device coordination. More complex, expensive. Octavian Catrina 6

7 MAC protocols IEEE 802 standards (examples) 802.3: CSMA/CD ( Ethernet) Carrier Sense Multiple Access with Collision Detection. Non-deterministic access, contention MAC protocol : Token Ring; 802.4: Token Bus (historical) Deterministic access, token rotation MAC protocol : Wireless LANs Non-deterministic access using CSMA/CA - CSMA with Collision Avoidance. Deterministic access using polling : 100 VG-AnyLAN (historical) Deterministic access, round-robin scheduling protocol. ANSI/ISO standard (ISO 9314) (historical) FDDI (Fiber Distributed Digital Interface) Deterministic access, timed token rotation protocol. Octavian Catrina 7

8 OSI Physical OSI Data Link CSMA-CD: IEEE Token Ring: IEEE Wireless LAN: IEEE and many others Physical MAC sublayer LLC sublayer Scope IEEE LAN standards For each LAN type: MAC sublayer + PHY layer. Common Logical Link Control (LLC) sublayer: LAN interconnection (bridges/switches): MAC sublayer Framing, addressing, error detection, MAC protocols. Connectionless unreliable service. LLC sublayer Often empty in IP networks... Provides a common DL service interface for all MAC types and protocols for more service types: best effort, reliable connection oriented and connectionless. Logical Link Control LLC: IEEE Octavian Catrina 8

9 ALOHA Non-deterministic access Transmit at will. Towards CSMA/CD (Ethernet) Very low efficiency (up to 18% channel utilization). CSMA: Carrier Sense Multiple Access Transmit only when sensing the medium idle. Collisions still possible due to propagation delay. Efficiency is still quite low. CSMA/CD: CSMA with Collision Detection Adding collision detection allows: (1) interruption of failed transmission and (2) immediate recovery by retransmission. Most widespread technology for wired shared media LANs. Octavian Catrina 9

10 CSMA/CD principle Transmit only when sensing medium idle (CSMA). Detect collision (CD), abort transmission, retry later. A backoff 12: A looses! t 0 t B d=c t 0-2 t 0+ backoff 02: B wins! c = signal propagation speed. d = distance (cable length). = signal propagation delay. t Time elapsed from transmission start until collision detection: 2. Maximum duration of a transmission in case of collision 2. After a collision, the stations must defer the attempts to transmit for a random time interval (backoff) to avoid systematic collisions. Octavian Catrina 10

11 More insight Ensuring collision detection Minimum frame transmission duration: T min > 2. Transmit brief jamming signal after detecting collision. Solving contention Defer retransmission after collision with random delay: backoff. Backoff delay is random multiple N of 2 time slots. Ensures the transmitter with shortest backoff delay wins. Range of N for K consecutive collisions is [0, 2 min(k, 10) -1]. Binary exponential backoff. Adapts backoff delay to load, ensures that contention ends at high load. Reduces collision probability when many senders are active by spreading retransmissions over longer intervals. Limit the number of retries: K max = 16. CSMA/CD efficiency Efficient operation when contention duration (multiple of 2) is much shorter than transmission duration (T): /T << 1. Efficiency decreases as delay (distance) and/or data rate increase. Octavian Catrina 11

12 Ethernet frame format (IEEE 802.3) octets: PA SFD DA SA L/T Data Pad FCS octets covered by FCS PA: Preamble - synchronization ( ) SFD: Start of Frame Delimiter ( ) DA: Destination Address SA: Source Address L/T: Length of data field (octets) if Else, payload type. Pad: Extra bits added when the frame has less than 64 octets. FCS: Frame Check Sequence (CRC-32.) Baseband transmission. MAC addresses: bits: I/G U/L 46-bit address I/G = 0/1 - individual/group (multicast). U/L = 0/1 - local/global administered. 0xFFFFFFFF = broadcast address. Assumed maximum round-trip propagation delay: 2 = 51.2 s Octavian Catrina 12

13 Examples of Ethernet frames Note: Padding is at the end of the frame MAC Length + Padding + LLC + Payload MAC Type + Padding + Payload MAC Type + Payload Octavian Catrina 13

14 CSMA/CD protocol overview Wait for data to send. Format frame Transmission Reception Y Carrier sense ON? N Wait inter-frame gap. Start frame transmission Collision detected? Y Abort frame transmission. Transmit jam signal (32 bits). Increment collision counter K N Complete transmission Status: Done N Incoming signal detected? Y Set carrier sense signal ON. Bit synchronization. Wait for SFD. Receive frame. FCS and frame size OK? Y N K > 16? N Y Backoff: wait N slots, N = random (0, 2 min (K, 10) -1) Discard frame. Status: Attempt limit exceeded Matching dest. address? Y Deliver frame to higher sub-layer N Discard frame. Octavian Catrina 14

15 Ethernet: A success story First Ethernet Xerox (1970's), joined later by DEC and Intel. 1-2 Mbps. Deployed since the beginning of the 1980s. 10 Mbps - Ethernet (IEEE 802.3, 1985) 10BASE5/10BASE2: bus topology, thick/thin coaxial. 10BASE-T/FX: star topology, UTP/optical fiber. Switched Ethernet - early 1990s. 100 Mbps - Fast Ethernet (1996) 100BASE-TX/FX: star, UTP(STP)/optical fiber Mbps - Gigabit Ethernet (1999) 1000BASE-FX/CX/T: star, optical fiber/copper(stp/utp). Normally used in switched Ethernet LANs/MANs. Still supports CSMA/CD. 10 Gbps Ethernet in Switched Ethernet LANs/MANs. 100 Gbps Ethernet in 2010 Octavian Catrina 15

16 Token Ring overview (historical) Outline Logical ring topology with star wiring. One-way links, active interfaces. Copper (shielded twisted pair) or optical fiber cable. 4/16/100 Mbps, < 260 stations, < 100 m between stations. MAC protocol Token rotation (token passing) protocol. Real-time traffic support: - Limited access delay by limited token holding time. - Priorities. Interface Token Concentrator Octavian Catrina 16

17 Token rotation protocol Token Ring interface Repeat mode: Transmit mode: Rx Rx Tx Tx Octavian Catrina 17

18 Shared media: Performance issues Frame transfer delay Medium access delay + Transmission duration + Propagation delay Specific component: medium access delay. Examples: CSMA/CD contention, Token rotation. Main problem: fast increase with traffic load. Throughput Time sharing of the medium Average throughput for each station is a fraction of the shared medium bandwidth.... DL/MAC PHY PHY Repeater PHY... DL/MAC PHY Shared media domain Shared media domain Extended shared media domain Frames delivered by flooding Octavian Catrina 18

19 Shared media: benefits and limitations Benefits Cost effective LAN connectivity. High data rate at end systems and low transfer delay for the lowest cost. Limitations Does not scale up for larger LANs and higher medium bandwidth. More stations Less bandwidth per station. Larger network and/or higher bandwidth decrease of medium bandwidth utilization: larger time fraction spent with transmission coordination by MAC protocol. Higher traffic Rapid increase of medium access delay. Octavian Catrina 19

20 Scalable LAN connectivity Meeting bandwidth requirements Increase medium bandwidth. Limited by data transmission technology, cost, MAC protocol efficiency. Improve bandwidth utilization. The only scalable solution. Rely on Data Link or/and Network layer functions for scalable, bandwidth-efficient connectivity. Towards scalable solutions in LANs Limit shared media domains. Segmentation with bridges, switches or routers. Other issues: Limit MAC broadcasts, use full-duplex instead of half-duplex, optimize paths, add redundant paths with load sharing, etc. Octavian Catrina 20

21 Switched LANs Bridges, Ethernet switches

22 LAN connectivity using bridges Bridges were introduced in the late 1980s to interconnect shared media LAN segments, at MAC (sub)layer. A bridge distinguishes inter-segment frames from intra-segment (local) frames, based on MAC addresses. Forwards inter-segment frames toward the destination. Filters (does not forward) intra-segment (local) frames. Inter-segment Forward Intra-segment No forward... Bridge DL/MAC PHY MAC PHY MAC PHY DL/MAC PHY Octavian Catrina 22

23 Transparent vs. Source routing bridges Transparent bridge Design goal: transparent interconnection. Stations ignore the presence of bridges. No HW/SW changes in stations: plug and play. Bridges discover attached stations and only forward inter-segment traffic. Standard: IEEE 802.1D-2004 (supersedes 802.1D-1990, 1998). Source routing bridge Design goal: optimal paths and load sharing. Source stations discover paths to destinations. Frame headers carry a path description. Bridges forward frames according to the path in the header. Historical: IEEE (Token Ring), ISO (FDDI). Transparent bridges were widely deployed in Ethernet LANs. They rapidly won the competition with source routing bridges, which were used only in Token Ring LANs. Octavian Catrina 23

24 Transparent bridges The bridge learns the location of the stations relative to its ports from the source MAC address of the received frames. This information is stored in a forwarding table and used to decide what frames to forward and where. Forward Destination at another port. Filter Destination at the same port. Flood Destination unknown or broadcast frame or multicast frame Forward Flood Filter Octavian Catrina 24

25 Learning and forwarding (1) Octavian Catrina 25

26 Learning and forwarding (2) Adaptation to topology changes What happens if station 1 is moved to the rightmost segment? It becomes unreachable (until it sends some frame)! The bridge must be able to automatically update the forwarding table to network topology changes. A timestamp is stored whenever a table entry is created or updated. Entries older than a preset max age are discarded. Octavian Catrina 26

27 Learning and forwarding (3) Bridge Architecture Receive & store frame on port P Frame buffer memory MAC Learning Logic Forwarding Table (FT) MAC Address Port Age Frame buffer memory MAC Learn SA Learn: Add FT entry: SA, port P, age No Read Source Address (SA) Is SA in FT? Yes Read Destination Address (DA) PHY Forwarding Logic PHY No Is DA broadcast? Yes Frame Frame Is DA in FT? Yes Read port for DA from FT = Q No Flood frame No Is P = Q? Yes Forward frame to port Q Filter (discard) frame Flood: Forward on all ports except P Octavian Catrina 27

28 Loops in bridged LANs Loops: How do they occur? Intended interconnections: LAN topology with alternate paths, able to maintain connectivity in case of failure (fault tolerance). Involuntary/accidental interconnections. Transparent bridges and loops In this example, the frame is flooded because its destination address is not in the table. Similar behavior for broadcast destination address. Frame from 1 to 2 12 The frame loops and proliferates! up 1 up DA Port 1 down DA Port 1 down Learn station 1. Flood. 12 Learn station Flood. Double delivery Learn station 1. Flood Learn station 1. Flood. Octavian Catrina 28

29 Loop-free full connectivity Spanning tree Sub-graph providing loop-free full connectivity. Spanning Tree Protocol (STP) STP allows transparent bridges to: Discover a spanning tree in the physical topology. Reduce the physical topology to a spanning tree by disabling some bridge ports. Monitor connectivity and enable/disable ports to adapt to network changes or failures. STP implements a distributed algorithm for determining and maintaining a spanning tree. Bridges communicate using control messages called BPDU (Bridge Protocol Data Units). Example of BPDU in slide 13. Octavian Catrina 29 L3 L4 1 L3 L2 3 5 L1 L L6 L4 6 L5 L6 Physical topology Root L1 L5 Spanning tree: Connects the root bridge to all LANs and all bridges on shortest paths. Provides loop-free, symmetric (two-way) connectivity. 6 Spanning tree

30 STP: Algorithm overview Bridge ID: Priority + MAC address. Cost assigned to each port: What "costs" to send a frame through that port (inv. of link bandwidth). Elect the root bridge: The bridge with the lowest bridge ID. Find the root path cost (RPC) of each port: The lowest path cost to reach the root by that port. Select the root port (R) of each bridge: Port with the lowest RPC. Select the designated bridge for each LAN segment: Bridge with the lowest RPC. The port of that bridge connected to the LAN is marked as designated port (D). Block () all the other ports (i.e., which are not R or D). Octavian Catrina 30 L4 R L1 D 1 RPC=0 R 1 RPC= D 1 Root 2 3 L5 2 2 D 3 RPC=0 3 RPC=3 L2 R 1 RPC=2 1 R 1 RPC=1 R 2 RPC= D RPC=3 L6 2 2 D 1 RPC=3 L3 1 RPC= D 2 RPC=2 Bridge identifiers (1, 2,...) Port identifiers (1, 2,...)

31 STP: Protocol overview BPDU: Contains the ID of the root assumed by the sender, the RPC, the sender's ID,... BPDU flow: BPDUs are multicast to all bridges on a LAN segment. The root bridge sends BPDUs periodically. Designated bridges relay BPDUs on their D ports. At power on: Initially, any bridge issues BPDUs claiming to be root. Eventually, only the elected root still issues BPDUs and the designated bridges relay them. Upon failure (worst case): The periodic BPDUs do not reach the bridge any more. After a preset time it restarts the spanning tree algorithm. Octavian Catrina 31 R L1 D 1 RPC=0 R 1 RPC=1 1 (1,0,1) (1,1,2) 1 2 D 1 Root 2 3 L5 2 2 D 3 RPC=0 3 RPC=3 L2 R 1 RPC=2 1 R 1 RPC=1 R 2 RPC= (1,1,3) (1,2,4) 1 D RPC=3 L6 2 2 D 1 RPC=3 L3 1 RPC=2 1 1 (1,2,5) 5 2 L4 D 2 RPC=2 BPDUs transmitted on D ports after convergence. Main info: Root Bridge ID, My RPC, My Bridge ID.

32 High performance multiport bridge Layer 2 (LAN) switches Parallel architecture, hardware implementation Multiple frames can be forwarded at the same time. Very low frame forwarding latency by early table lookup (next slide). Typically one station per switch port No more shared transmission media full duplex operation is possible. Asymmetric switching Ports can have different bit rates (fast ports for servers and inter-switch links). Octavian Catrina 33

33 Switching modes Store-and-forward switching The switch starts forwarding after receiving the complete frame. Frame forwarding delay (if no queuing): T = L/R. Delay is long and varies with frame length. All errors filtered. Preamble SFD DA SA Len Data FCS Cut-through Fragment-free Store-and-Forward Cut-through switching A switch can start forwarding after receiving the frame's DA. Usually: Start forwarding after receiving F = 64 octets. "Fragment-free": filters frames < 64 octets (collision fragments). Frame forwarding delay (if no queuing): T = F/R. Delay is very short and constant. Bit errors not filtered. Forwarding starts before receiving FCS. Octavian Catrina 34

34 Final example Physical topology. All links have the same cost. STP Bridge IDs are B1, B2, B8 and B1 < B2 < < B8. Root B B B B S Active topology created by STP and delivery of the frame X S. Designated Port: D Root Port: R Blocked Port Root B1 4 D R 1 2 B3 D D D D 1 1 D R B D 3 4 D D D D R 1 2 B4 3 D D D D S B1 Adr. Port S 1 X SA=X, DA=S B5 B6 B7 B We assume the following initial contents of the forwarding tables: B2 Adr. Port S 5 B3 Adr. Port Y 4 B4 Adr. Port S 1 SA=X, DA=S Bridge actions for the delivery of the frame X S and final contents of the forwarding tables: B1 Learn Fwd Adr. Port S 1 X 4 R R R R B5 B6 B7 B D D D D D D D D X B2 Learn Fwd Adr. Port S 5 X 1 B3 Learn Flood Adr. Port Y 4 X 6 B4 Nothing Adr. Port S 1 B5 Adr. Port X 4 B6 Adr. Port B7 Adr. Port Y 4 B8 Adr. Port Z 4 B5 Flood Adr. Port X 4 B6 Learn Flood Adr. Port X 1 B7 Learn Flood Adr. Port Y 4 X 1 B8 Learn Flood Adr. Port Z 4 X 1 Octavian Catrina 35

35 Bridges: benefits and limitations Benefits Cost effective solution for LAN connectivity with isolation of shared media segments. Minimal installation and maintenance effort. LAN connectivity independent of Network layer protocol. Limitations No broadcast control: single MAC broadcast domain. Imperfect filtering: flooding if destination unknown. No optimal paths, no load sharing (for transparent bridges). Transfer delay increases (for store and forward operation). Does not scale up for large inter-networks. 1/10 Gigabit Ethernet High performance and cost effective solutions for campus network backbone. Also, attractive solution for MANs. Octavian Catrina 36

36 Evolution of bridged LAN standards IEEE 802.1D MAC Bridges First standard for transparent bridges was 802.1D Various amendments have been incorporated in 2 revisions of the 802.1D standard, issued in 1998 and Amendment 802.1w-2001 specified Rapid STP (RSTP). RSTP was introduced to replace the original STP and provide much faster convergence after topology changes (from seconds to a few seconds in the worst case). Current version of the MAC Bridges standard is 802.1D IEEE 802.1Q VLAN Bridges Support for Virtual LANs was introduced in 802.1Q Development continued with a long series of amendments and 2 revisions of the standard, in 2005 and On-going work. Current version of the VLAN Bridges standard is 802.1Q Octavian Catrina 37

37 Towards more efficient connectivity Inefficient interconnection in traditional bridged LANs Traditional bridges can handle redundant paths in the physical topology, to provide fault tolerance. However, the spanning tree active topology cannot provide optimal paths and load balancing on alternate paths. Several recent developments aim at providing more efficient connectivity in bridged LANs (at MAC layer), using techniques borrowed from IP routing protocols. Shortest Path Bridging (SPB) Specified in 2012 by the IEEE, in amendment 802.1aq Transparent Interconnection of Lots of Links (TRILL) Proposed by Radia Perlman, specified in by the IETF, in RFC 5556, 6325, 6326, 6327, etc. Competing solutions supported by different vendors Octavian Catrina 38

38 Annex LAN Infrastructure

39 Star topology: Catchment area Transmission range Depends on physical medium characteristics, data rate, transmission technology, etc. Standardized (IEEE 802, EIA/TIA-568). Catchment area Area around the hub within transmission range. Example Catchment area for Ethernet 10BASE-T and 100Base-TX LANs (UTP). Octavian Catrina 40

40 Star topology: EIA/TIA 568/569 cabling < 3m < 6m < 90m Patch panel Wiring closet Specially designated room for wiring a data (or voice) network. Center of star topology. Horizontal cabling Cabling extending from a wiring closet to workstations. Octavian Catrina 41

41 Extended star topology: Multi-story building MDF: Main Distribution Facility Primary communications room (wiring closet) for a building or campus. Central point (root) of an extended star topology. IDF: Intermediate Distribution Facility Secondary communications room, lower hierarchy level in an extended star topology. POP: Point-Of-Presence Communications room serving as point of interconnection with local telecom network. Octavian Catrina 42

42 Extended star: Multi-building campus Octavian Catrina 43

43 Extended star: EIA/TIA 568/569 cabling Wiring closet HCC: Horizontal Cross Connect (patch panels). VCC: Vertical Cross Connect (patch panels). Wiring closet Octavian Catrina 44

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Computer Networks Principles LAN - Ethernet

Computer Networks Principles LAN - Ethernet Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2

More information

Access Technologies! Fabio Martignon

Access Technologies! Fabio Martignon Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several

More information

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr. Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

More information

Chapter 15 Local Area Network Overview

Chapter 15 Local Area Network Overview Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

IEEE standards for local area networks

IEEE standards for local area networks IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link

More information

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed

More information

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks Local Area Networks A Local Area Netw ork is a communications netw ork that provides interconnection of a variety of data communicating devices w ithin a small area. Typical Characteristics! High Data

More information

Lecture 05 Chapter 16 High Speed LANs

Lecture 05 Chapter 16 High Speed LANs NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Data and Computer Communications. Chapter 11 Local Area Network

Data and Computer Communications. Chapter 11 Local Area Network Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

Chapter 11 in Stallings 10 th Edition

Chapter 11 in Stallings 10 th Edition Local Area Network Overview Chapter 11 in Stallings 10 th Edition CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large

More information

Introduction to Ethernet. Guy Hutchison 8/30/2006

Introduction to Ethernet. Guy Hutchison 8/30/2006 Introduction to Ethernet Guy Hutchison 8/30/2006 What is Ethernet? Local area transport protocol Layer 2 of the OSI stack Zero/minimal configuration Low-cost, high performance Best-effort delivery Original

More information

Internet Architecture and Protocol

Internet Architecture and Protocol Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport

More information

Lecture 6: Example LAN: Ethernet

Lecture 6: Example LAN: Ethernet Lecture 6: Example LAN: Ethernet Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Network Types Local Area Networks (LANs):privately-owned networks

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2 High Speed LANs CS420/520 Axel Krings Page 1 High Speed LANs Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs CS420/520 Axel Krings Page 2 1 Why High Speed LANs? Office

More information

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science 1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we

More information

Ethernet. Introduction. CSE 3213 Fall 2011

Ethernet. Introduction. CSE 3213 Fall 2011 Ethernet CSE 3213 Fall 2011 19 October 2011 1 Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed LAN technologies: Fast and gigabit Ethernet

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control 168 430 Computer Networks Chapter 16 High Speed LANs Introduction Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs Why High Speed LANs? Office LANs used to provide

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services

More information

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial

More information

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub Campus Network Design Thana Hongsuwan Ethernet Hub 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 1-2 Sending and receiving Ethernet frames

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Physical and Data Link layers

Physical and Data Link layers Physical and Data Link layers Youki Kadobayashi Graduate School of Science Nara Institute of Science and Technology Physical Layer All rights reserved. 2 Types of transmission medium! Cables Optical fiber

More information

EECS 122, Lecture 7. Kevin Fall Jean Walrand

EECS 122, Lecture 7. Kevin Fall Jean Walrand EECS 122, Lecture 7 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu : Outline Typical Setup Names Physical Layer Frame Fast Ethernet; Gigabit Ethernet 10Base5 Efficiency of CSMA/CD

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and High Speed LANs 3BA33 David Lewis 2 nd Semester 2006-07 3BA33 D.Lewis 2007 1 Characteristics of High Speed LANS 3BA33 D.Lewis 2007 3 Introduction Fast Ethernet and Gigabit Ethernet Fibre Channel High-speed

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21! CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

LAN Systems. Bus topology LANs

LAN Systems. Bus topology LANs Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Four data rates are

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017 CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology

More information

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,

More information

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

10- and 100-Mbps Ethernet

10- and 100-Mbps Ethernet Ethernet Basics 10-Mbps Ethernet Three 10-Mbps Ethernet standards: 10BASE5 10BASE2 10BASE-T 10BASE2 and 10BASE5 were around more than 20 years and have been replaced by newer alternatives 10BASE-T s use

More information

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic 1 LAN Protocols Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8 CSE 3213, Fall 2015 Instructor: N. Vlajic What is LAN? 2 Local Area Network (LAN) properties private ownership freedom to choose/change/upgrade

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

Contents. Introduction to Networking. Preface...i. Introduction... xix

Contents. Introduction to Networking. Preface...i. Introduction... xix Contents Introduction to Networking Introduction to Networking Preface...i Key Topics...i Course Objectives...ii Pedagogical Features...ii Learning Objectives, Unit Summaries, Discussion Questions, and

More information

Communication (III) Kai Huang

Communication (III) Kai Huang Communication (III) Kai Huang Ethernet Turns 40 12/17/2013 Kai.Huang@tum 2 Outline Bus basics Multiple Master Bus Network-on-Chip Examples o SPI o CAN o FlexRay o Ethernet Basic OSI model Real-Time Ethernet

More information

Some portions courtesy Srini Seshan or David Wetherall

Some portions courtesy Srini Seshan or David Wetherall CSE 123 Computer Networks Fall 2009 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Misc Homework solutions have been posted I ll post a sample

More information

Introduction to Computer Networks. IEEE Ethernet

Introduction to Computer Networks. IEEE Ethernet Introduction to Computer Networks IEEE 802.3 Ethernet All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,

More information

Ethernet. Networks: Ethernet 1

Ethernet. Networks: Ethernet 1 Ethernet Networks: Ethernet 1 Ethernet [DEC, Intel, Xerox] 1-persistent, CSMA-CD with Binary Exponential Backoff Manchester encoding Networks: Ethernet 2 Ethernet [operational in 1974] Initially 3 Mbps

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for

More information

Raj Jain. The Ohio State University Columbus, OH

Raj Jain. The Ohio State University Columbus, OH Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 3-1 Overview ISO/OSI Reference Model TCP/IP Reference Model Differences between ISO and TCP Ethernet/IEEE 802.3 LANs Interconnecting

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

1. Data Link Layer Protocols

1. Data Link Layer Protocols 1. Data Link Layer Protocols Purpose of the Data Link Layer The Data Link Layer Purpose of the Data Link Layer Data Link Sublayers Network LLC Sublayer Data Link Physical MAC Sublayer 802.3 Ethernet 802.11

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 7: Switching technologies Chapter 3.1 Xiaowei Yang xwy@cs.duke.edu Types of switching Datagram Virtual circuit Source routing Today Bridges and LAN switches

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information