L2 Addressing and data plane. Benjamin Baron

Size: px
Start display at page:

Download "L2 Addressing and data plane. Benjamin Baron"

Transcription

1 L2 Addressing and data plane Benjamin Baron

2 Goals of Today s Lecture Devices that shuttling packets at different layers - Repeaters and hubs - Bridges and switches - Routers Switch protocols and mechanisms - Dedicated access and full-duplex transfers - Cut-through switching - Self learning of the switch table - Spanning trees

3 Inside the Network Forward packets from the sender to the receiver

4 Hop-by-Hop Packet Forwarding Each router has a forwarding table - Maps destination addresses - to outgoing interfaces Upon receiving a packet - Inspect the destination IP address in the header - Index into the table - Determine the outgoing interface - Forward the packet out that interface Then, the next router in the path repeats - And the packet travels along the path to the destination

5 Forwarding vs. Routing Forwarding: data plane - Directing a data packet to an outgoing link - Individual router using a forwarding table Routing: control plane - Computing paths the packets will follow - Routers talking amongst themselves - Individual router creating a forwarding table

6 The Internet Network Layer Host, router network layer functions: Transport layer: TCP, UDP Network layer Routing protocols path selection RIP, OSPF, BGP forwarding table IP protocol addressing conventions datagram format packet handling conventions ICMP protocol error reporting router signaling Link layer physical layer

7 What is Routing? A famous quotation from RFC 791 A name indicates what we seek. An address indicates where it is. A route indicates how we get there. - Jon Postel

8 What is Addressing? Providing suitable identifiers to nodes - So you can direct data to a node - So you know which node sent the data - and how to send data back to that node Addressing in the French mail - Zip code: Street: place Jussieu - Building on street: 4 - Room in building: 26-00/128 - Name of occupant: Benjamin Baron??? Does or should addresses always reflect the underlying network topology?

9 Geographical Phone Numbers Non-geographical - 08 : indirection service (0800 free for the caller) - 09 : telephone service offered by ISPs - 06, 07 : Cell phone numbers (nodes are mobile) -... blurring distinction between name and address

10 Three Kinds of Identifiers Host Name IP Address MAC Address Example CA-F8-C1-87 Size Hierarchical, human readable, variable length Hierarchical, machine readable, 32 bits (in IPv4) Flat, machine readable, 48 bits Read by Humans, hosts IP routers Switches in LAN Allocation, top-level Domain, assigned by registrar (e.g., for.edu) Variable-length prefixes, assigned by ICANN, RIR, or ISP Fixed-sized blocks, assigned by IEEE to vendors (e.g., Dell) Allocation, low-level Host name, local administrator Interface, by admin or DHCP Interface, by vendor

11 Overview Two widely-used addressing schemes - Medium Access Control (MAC) addresses - Internet Protocol (IP) addresses Key concepts in addressing - Number of unique addresses - Allocating addresses to nodes - Flat vs. hierarchical structure - Persistent vs. temporary identifiers - Handling diminishing address space - Spoofing of source addresses

12 Some Questions Could every host on the Internet have an arbitrary, unique numerical address? - Would it scale? If hierarchy is necessary, how to do it? - Tying the addressing to the topology & routing? - What about mobile hosts? Temporary addresses? Who should allocate the addresses? - Network provider? Device manufacturer? Does the sender of the traffic need to authenticate itself? The destination? - What about spoofing and impersonation?

13 Comparing MAC and IP Addresses MAC IP Assignment Hard-coded in the adaptor Configured or learned Size 48 bits 32 bits (in v4) Structure Flat Hierarchical Portability Purpose Constant over life of the adapter Delivery within a single network Changes with time and location Delivery across an inter-network E.g., social security number vs. postal address

14 MAC Addresses

15 The Link Layer LAN/Physical/MAC address - Flat structure - Unique to physical interface (no two alike) how? sender datagram link layer protocol receiver frame adapter frame adapter Frames can be sent to a specific MAC address or to the broadcast MAC address What are the advantages to separating network layer from MAC layer?

16 Services Provided by the Link Layer Framing - Encapsulation of a network-layer datagram IEEE vision: - Link Access: Sharing of broadcast links and shared media - Error detection: damaged frames are quietly discarded (Ethernet FCS ) OSI vision - Reliable Delivery: Guarantee to deliver the frame to the other end of the link without error Flow Control: The link layer can provide mechanisms to avoid overflowing the buffer Error Correction: Determining where errors have occurred and then correcting those errors.

17 Local Area Networks Benefits of being local : - Lower cost - Short distance = faster links, low latency Efficiency less pressing - One management domain - More homogenous Examples: - Ethernet - Token ring, FDDI wireless

18 Problem: Sharing a Wire Learned how to connect hosts But what if we want more hosts? Switches Expensive! How can we share a wire? Wires for everybody!

19 Random Access Protocols When node has packet to send - Transmit at full channel data rate R - No a priori coordination among nodes Two or more transmitting nodes à collision Random access MAC protocol specifies: - How to detect collisions - How to recover from collisions (e.g., via delayed retransmissions) Examples of random access MAC protocols: - Slotted ALOHA and ALOHA - CSMA/CD (Ethernet) CSMA/CA (WiFi)

20 Ethernet MAC If line is idle (no carrier sensed) send packet immediately If line is busy (carrier sensed) wait until idle and transmit packet immediately If collision detected - Stop sending and jam signal - Jam signal: make sure all other transmitters are aware of collision - Wait a random time (Exponential backoff), and try again How does sender detect collision? How long does it take?

21 Life of a Packet: On a Subnet Packet destined for outgoing IP address arrives at network interface - Packet must be encapsulated into a frame with the destination MAC address (ARP) Frame is sent on LAN segment to all hosts - Any host listens to all passing frames Hosts check destination MAC address - Destination MAC address is checked against the host interface MAC address What if a frame is broadcasted instead?

22 Addressing Alternatives Broadcast media à all nodes receive all packets - Addressing determines which packets are kept and which are packets are thrown away - Packets can be sent to: Unicast one destination Multicast group of nodes (e.g. everyone playing Quake ) Broadcast everybody on wire Dynamic addresses (e.g. Appletalk) - Pick an address at random - Broadcast is anyone using address XX? - If yes, repeat Static address (e.g. Ethernet)

23 MAC Addresses Flat name space of 48 bits - Typically written in six octets in hex - E.g., 20:c9:d0:86:dd:27 for my Ethernet Organizationally unique identifier - Assigned by IEEE Registration Authority - Determines the first 24 bits of the address - E.g., 20:c9:d0 corresponds to Apple Remainder of the MAC address - Allocated by the manufacturer - E.g., 86:dd:27 for my Ethernet card

24 Forwarding Frames to Destination Adapter Shared media - Forward all frames on the shared media - Adapter grabs frames with matching dest address Multi-hop switched networks - Flood every frame over every link? host host... host - Learn where the MAC address is located? host host host host

25 Interconnecting LANs Receive & broadcast ( hub ) Learning switches Spanning tree (RSTP, MSTP, etc.) protocols

26 Interconnecting LANs with Hubs All packets seen everywhere - Lots of flooding, chances for collision Can t interconnect LANs with heterogeneous media (e.g., Ethernets of different speeds) hub hub hub hub

27 Scalability Problems with Hubs: No Isolation Latency - Avoiding collisions requires backoff - Possible for a single host to hog the medium Failures - One misconfigured device can cause problems for every other device on the LAN

28 Link-layer Improving on Hubs: Switches - Stores and forwards Ethernet frames - Examines frame header and selectively forwards frame based on MAC dest address - When frame is to be forwarded on segment, uses CSMA/CD to access segment Transparent - Hosts are unaware of presence of switches Plug-and-play, self-learning - Switches do not need to be configured

29 LAN Switching Extend reach of a single shared medium Connect two or more segments by copying data frames between them - Switches only copy data when needed à key difference from repeaters LAN 1 LAN 2

30 Switch: Traffic Isolation Switch breaks subnet into LAN segments Switch filters packets - Same-LAN-segment frames not usually forwarded onto other LAN segments - Segments become separate collision domains switch collision domain hub hub hub collision domain collision domain

31 Filtering and Forwarding Occurs through switch table Suppose a packet arrives destined for node with MAC address x from interface A - If MAC address not in table, flood (act like a hub) - If MAC address maps to A, do nothing (packet destined for same LAN segment) - If MAC address maps to another interface, forward LAN A A B C LAN B LAN C How does this table get configured?

32 Scalability Challenges MAC addresses are flat - Multiple hosts on the same network - No relationship between MAC addresses Data plane - Forwarding based on MAC address - Switch table size? Look-up overhead? Control plane - Determining where the host is located - Keeping the information up-to-date

33 Advantages vs. Hubs Better scaling - Separate collision domains allow longer distances Better privacy - Hosts can snoop the traffic traversing their segment - but not all the rest of the traffic Heterogeneity - Joins segments using different technologies

34 Disadvantages vs. Hubs Delay in forwarding frames - Bridge/switch must receive and parse the frame - and perform a look-up to decide where to forward - Storing and forwarding the packet introduces delay - Solution: cut-through switching Need to learn where to forward frames - Bridge/switch needs to construct a forwarding table - Ideally, without intervention from network administrators - Solution: self-learning

35 Motivation For Self Learning Switches forward frames selectively - Forward frames only on segments that need them Switch table - Maps dest MAC address to outgoing interface - Goal: construct the switch table automatically B A C switch D

36 When a frame arrives Self Learning: Building the Table - Inspect the source MAC address - Associate the address with the incoming interface - Store the mapping in the switch table - Use a TTL field to eventually forget the mapping Switch learns how to reach A. B A C D

37 Self Learning: Handling Misses When frame arrives with unfamiliar dest - Forward the frame out all of the interfaces - except for the one where the frame arrived - Hopefully, this case won t happen very often Switch floods frame that is destined to C. B A C D

38 Switch Filtering/Forwarding When switch receives a frame: index switch table using MAC dest address if entry found for destination then { if dest on segment from which frame arrived then drop the frame } else forward the frame on interface indicated else flood forward on all but the interface on which the frame arrived

39 Cut-Through Switching Buffering a frame takes time - Suppose L is the length of the frame - And R is the transmission rate of the links - Then, receiving the frame takes L/R time units Buffering delay can be a high fraction of total delay, especially over short distances A B switches

40 Cut-Through Switching Start transmitting as soon as possible - Inspect the frame header and do the look-up - If outgoing link is idle, start forwarding the frame Overlapping transmissions - Transmit the head of the packet via the outgoing link - while still receiving the tail via the incoming link A switches B

41 Flooding Can Lead to Loops Switches sometimes need to broadcast frames - Upon receiving a frame with an unfamiliar destination - Upon receiving a frame sent to the broadcast address Broadcasting is implemented by flooding - Transmitting frame out every interface - except the one where the frame arrived Flooding can lead to forwarding loops - E.g., if the network contains a cycle of switches - Either accidentally, or by design for higher reliability

42 Solution: Spanning Trees Ensure the topology has no loops - Avoid using some of the links when flooding - to avoid forming a loop Spanning tree - Sub-graph that covers all vertices but contains no cycles - Links not in the spanning tree do not forward frames

43 Constructing a Spanning Tree Need a distributed algorithm - Switches cooperate to build the spanning tree - and adapt automatically when failures occur Key ingredients of the algorithm - Switches need to elect a root The switch with the smallest identifier - Each switch identifies if its interface is on the shortest path from the root And it exclude from the tree if not - Messages (Y, d, X) From node X Claiming Y is the root And the distance is d root One hop Three hops

44 Steps in Spanning Tree Algorithm Initially, each switch thinks it is the root - Switch sends a message out every interface - identifying itself as the root with distance 0 - Example: switch X announces (X, 0, X) Switches update their view of the root - Upon receiving a message, check the root id - If the new id is smaller, start viewing that switch as root Switches compute their distance from the root - Add 1 to the distance received from a neighbor - Identify interfaces not on a shortest path to the root - and exclude them from the spanning tree

45 Example From Switch #4 s Viewpoint Switch #4 thinks it is the root - Sends (4, 0, 4) message to 2 and 7 Then, switch #4 hears from #2 1 - Receives (2, 0, 2) message from 2 - and thinks that #2 is the root - And realizes it is just one hop away 3 5 Then, switch #4 hears from #7 - Receives (2, 1, 7) from 7 - And realizes this is a longer path - So, prefers its own one-hop path - And removes 4-7 link from the tree

46 Example From Switch #4 s Viewpoint Switch #2 hears about switch #1 - Switch 2 hears (1, 1, 3) from 3 - Switch 2 starts treating 1 as root 1 - And sends (1, 2, 2) to neighbors Switch #4 hears from switch #2 - Switch 4 starts treating 1 as root And sends (1, 3, 4) to neighbors Switch #4 hears from switch #7 - Switch 4 receives (1, 3, 7) from 7 - And realizes this is a longer path - So, prefers its own three-hop path And removes 4-7 Iink from the tree

47 Robust Spanning Tree Algorithm Algorithm must react to failures - Failure of the root node Need to elect a new root, with the next lowest identifier - Failure of other switches and links Need to recompute the spanning tree Root switch continues sending messages - Periodically reannouncing itself as the root (1, 0, 1) - Other switches continue forwarding messages Detecting failures through timeout (soft state!) - Switch waits to hear from others - Eventually times out and claims to be the root

48 MAC Addresses Disadvantages - Large forwarding tables in the data plane - Flooding overhead to learn location information - Lack of privacy Advantages - Persistent identifier (well, except for spoofing) - Mobile hosts are easy to handle - Forwarding-table look-up is a simple match

49 Hubs and Switches Different devices switch different things - Physical layer: electrical signals (repeaters, hubs) - Link layer: frames (bridges, switches) - Network layer: packets (routers) Key ideas in switches - Self learning of the switch table - Cut-through switching - Spanning trees Virtual LANs (VLANs) Application gateway Transport gateway Router Bridge, switch Frame header Packet header TCP header User data Repeater, hub

50 Switched Network Advantages Higher link bandwidth - Point to point electrically simpler than bus Much greater aggregate bandwidth - Separate segments can send at once Improved fault tolerance - Redundant paths Challenge - Learning which packets to copy across links - Avoiding forwarding loops

51 Switches vs. Routers Switches - Switches are automatically configuring - Forwarding tends to be quite fast, since packets only need to be processed through layer 2 Routers - Router-level topologies are not restricted to a spanning tree - Can even have multipath routing

52 Evolution Toward Virtual In the olden days LANs - Thick cables snaked through cable ducts in buildings - Every computer they passed was plugged in - All people in adjacent offices were put on the same LAN - Independent of whether they belonged together or not More recently - Hubs and switches changed all that - Every office connected to central wiring closets - Often multiple LANs (k hubs) connected by switches - Flexibility in mapping offices to different LANs Group users based on organizational structure, rather than the physical layout of the building.

53 Why Group by Organizational Structure? Security - Ethernet is a shared media - Any interface card can be put into promiscuous mode - and get a copy of all of the traffic (e.g., midterm exam) - So, isolating traffic on separate LANs improves security Load - Some LAN segments are more heavily used than others - E.g., researchers running experiments get out of hand - can saturate their own segment and not the others - Plus, there may be natural locality of communication - E.g., traffic between people in the same research group

54 People Move, and Roles Change Organizational changes are frequent - E.g., faculty office becomes a grad-student office - E.g., graduate student becomes a faculty member Physical rewiring is a major pain - Requires unplugging the cable from one port - and plugging it into another - and hoping the cable is long enough to reach - and hoping you don t make a mistake Would like to rewire the building in software - The resulting concept is a Virtual LAN (VLAN)

55 Example: Two Virtual LANs R RO RO RO O Red VLAN and Orange VLAN Bridges forward traffic as needed

56 Example: Two Virtual LANs R O O O R O R R R R R R RO O O O O Red VLAN and Orange VLAN Bridges forward traffic as needed

57 Making VLANs Work Bridges/switches need configuration tables - Saying which VLANs are accessible via which interfaces Approaches to mapping to VLANs - Each interface has a VLAN color Only works if all hosts on same segment belong to same VLAN - Each MAC address has a VLAN color Useful when hosts on same segment belong to different VLANs Useful when hosts move from one physical location to another Changing the Ethernet header - Adding a field for a VLAN tag - Implemented on the bridges/switches - but can still interoperate with old Ethernet cards

58 Ethernet 802.1q Making VLANs Work

59 Moving From Switches to Routers Advantages of switches over routers - Plug-and-play - Fast filtering and forwarding of frames - No pronunciation ambiguity (e.g., rooter vs. rowter ) Disadvantages of switches over routers - Topology is restricted to a spanning tree - Large networks require large ARP tables - Broadcast storms can cause the network to collapse

60 Comparing Hubs, Switches, & Routers traffic isolation hubs routers switches no yes yes plug & play yes no yes optimal routing cut through no yes no yes no yes

61 Conclusion Shuttling data from one link to another - Bits, frames, packets, - Repeaters/hubs, bridges/switches, routers, Key ideas in switches - Cut-through switching - Self learning of the switch table - Spanning trees - Virtual LANs (VLANs) - Routers: next lecture

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Ethernet. EE 122: Intro to Communication Networks. Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz

Ethernet. EE 122: Intro to Communication Networks. Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz Ethernet EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Link layer: introduction

Link layer: introduction Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017 CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology

More information

Professor Yashar Ganjali Department of Computer Science University of Toronto.

Professor Yashar Ganjali Department of Computer Science University of Toronto. Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Announcements Problem Set 1 is posted on class web page. Problems

More information

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1 Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

A primer on modern LANs

A primer on modern LANs Advanced Networks http://disi.unitn.it/locigno/index.php/teaching-duties/ A primer on modern LANs Renato Lo Cigno Copyright Quest opera è prote1a dalla licenza: Crea&ve Commons A-ribuzione- Non commerciale-

More information

CSC 4900 Computer Networks: Link Layer (2)

CSC 4900 Computer Networks: Link Layer (2) CSC 4900 Computer Networks: Link Layer (2) Professor Henry Carter Fall 2017 Link Layer 6.1 Introduction and services 6.2 Error detection and correction 6.3 Multiple access protocols 6.4 LANs addressing,

More information

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

Hubs. twisted pair. hub. 5: DataLink Layer 5-1 Hubs Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSMA/CD at : adapters detect collisions provides net management

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) March 19 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks Reliable

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Some portions courtesy Srini Seshan or David Wetherall

Some portions courtesy Srini Seshan or David Wetherall CSE 123 Computer Networks Fall 2009 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Misc Homework solutions have been posted I ll post a sample

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.1: Internetworking Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

The Link Layer and LANs: Ethernet and Swiches

The Link Layer and LANs: Ethernet and Swiches The Link Layer and LNs: Ethernet and Swiches EECS3214 2018-03-21 Link layer, LNs: outline 6.1 introduction, services 6.2 error detection, correction 6.3 multiple access protocols 6.4 LNs addressing, RP

More information

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a

More information

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging) Administrivia CSC458 Lecture 4 Bridging LANs and IP Homework: # 1 due today # 2 out today and due in two weeks Readings: Chapters 3 and 4 Project: # 2 due next week Tutorial today: Joe Lim on project 2

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 2. Direct Link Networks Link Service and Framing Error Detection and Reliable Transmission HDLC, PPP, and SONET Token Ring Ethernet Bridges and

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)

More information

Computer Networks Principles LAN - Ethernet

Computer Networks Principles LAN - Ethernet Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs A note on the use of these ppt slides: All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 4 th edition.

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer, Switches, VLANS, MPLS, Data Centers Sec 6.4 to 6.7 Prof. Lina Battestilli Fall 2017 Chapter 6 Outline Link layer and LANs: 6.1 introduction,

More information

Addressing and Switching in the Link Layer

Addressing and Switching in the Link Layer Addressing and Switching in the Link Layer Stefano Vissicchio UCL Computer Science COMP00 Recap: We have done a full pass on the stack email WWW phone...! SMTP HTTP RTP...! TCP UDP!! IP! When and how to

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 9 The Data Link Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Physical Addresses Physical (or LAN or MAC) address: 48 bit string Hexadecimal representation

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

Lecture 20: Link Layer

Lecture 20: Link Layer Lecture 20: Link Layer COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross, All Rights

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Last Time How do multiple hosts share a single channel?

More information

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date

More information

CS 455/555 Intro to Networks and Communications. Link Layer Addressing, Ethernet, and a Day in the Life of a Web Request

CS 455/555 Intro to Networks and Communications. Link Layer Addressing, Ethernet, and a Day in the Life of a Web Request CS 455/555 Intro to Networks and Communications Link Layer Addressing, ernet, and a Day in the Life of a Web Request Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18 1 Final project demo Please do the demo THIS week to the TAs. Or you are allowed to use

More information

Principles behind data link layer services:

Principles behind data link layer services: Data Link Layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

7010INT Data Communications Lecture 7 The Network Layer

7010INT Data Communications Lecture 7 The Network Layer Introduction 7010INT Data Communications Lecture 7 The Layer Internetworking & Devices Connecting LANs Routing Backbone networks Virtual LANs Addressing Application Presentation Session Data Link Physical

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

More on Link Layer. Recap of Last Class. Interconnecting Nodes in LAN (Local-Area Network) Interconnecting with Hubs. Computer Networks 9/21/2009

More on Link Layer. Recap of Last Class. Interconnecting Nodes in LAN (Local-Area Network) Interconnecting with Hubs. Computer Networks 9/21/2009 More on Link Layer Kai Shen Recap of Last Class Ethernet dominant link layer technology for local-area l networks Ethernet frame structure Ethernet multiple access control CSMA/CD, exponential back-off

More information

Lecture 16: Network Layer Overview, Internet Protocol

Lecture 16: Network Layer Overview, Internet Protocol Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises

Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises Full paper available at http://www.cs.princeton.edu/~chkim Changhoon Kim, Matthew Caesar, and Jennifer Rexford Outline of Today

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

EPL606. Internetworking. Part 2a. 1Network Layer

EPL606. Internetworking. Part 2a. 1Network Layer EPL606 Internetworking Part 2a The majority of the slides in this course are adapted from the accompanying slides to the books by Larry Peterson and Bruce Davie and by Jim Kurose and Keith Ross. Additional

More information

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Access Control ALOHA FDMA, TDMA, CDMA OSI Model Internetworking

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

ECSE 414 Fall 2014 Final Exam Solutions

ECSE 414 Fall 2014 Final Exam Solutions ECSE 414 Fall 2014 Final Exam Solutions Question 1 a. The five main layers of the internet protocol stack, along with the service provided by each, and the place where each is implemented are as follows:

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

CMPE 150 Winter 2009

CMPE 150 Winter 2009 CMPE 150 Winter 2009 Lecture 9 February 3, 2009 P.E. Mantey CMPE 150 -- Introduction to Computer Networks Instructor: Patrick Mantey mantey@soe.ucsc.edu http://www.soe.ucsc.edu/~mantey/ / t / Office: Engr.

More information

CSCD 330 Network Programming Spring 2017

CSCD 330 Network Programming Spring 2017 CSCD 330 Network Programming Spring 2017 Lecture 18 Link Layer Protocols Continued Who is this? Reading: Chapter 5 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright

More information

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 2 Network Fundamentals Roadmap Network Fundamentals

More information

Telematics I. Chapter 6 Internetworking. (Acknowledement: These slides have been compiled from H. Karl s set of slides)

Telematics I. Chapter 6 Internetworking. (Acknowledement: These slides have been compiled from H. Karl s set of slides) Telematics I Chapter 6 Internetworking (Acknowledement: These slides have been compiled from H. Karl s set of slides) 1 Goals of This Chapter So far: we can communicate between nodes all connected directly

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today: Link Layer (cont.) Framing Reliability Error correction Sliding window Medium

More information

CSE 461: Bridging LANs. Last Topic

CSE 461: Bridging LANs. Last Topic CSE 461: Bridging LANs Last Topic Medium Access Control (MAC) protocols Part of the Link Layer At the heart of Local Area Networks (LANs) How do multiple parties share a wire or the air? Random access

More information

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access Last time Wireless link-layer Introduction Wireless hosts, base stations, wireless links Characteristics of wireless links Signal strength, interference, multipath propagation Hidden terminal, signal fading

More information

The Link Layer II: Ethernet

The Link Layer II: Ethernet Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols

More information

Chapter 4. DataLink Layer. Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.

Chapter 4. DataLink Layer. Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Chapter 4 DataLink Layer Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. DataLink Layer Link Layer 4.1 Link-Layer Addressing 4.2 Ethernet

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

Midterm Review. Topics. Review: Network. Review: Network. Layers & Protocols. Review: Network WAN. Midterm Review EECS 122 EECS 122

Midterm Review. Topics. Review: Network. Review: Network. Layers & Protocols. Review: Network WAN. Midterm Review EECS 122 EECS 122 Topics Midterm Review EECS University of California Berkeley Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:

More information

Midterm Review EECS 122. University of California Berkeley

Midterm Review EECS 122. University of California Berkeley Midterm Review EECS University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:

More information

Hubs, Bridges, and Switches (oh my) Hubs

Hubs, Bridges, and Switches (oh my) Hubs Hubs, Bridges, and Switches (oh my) Used for extending LANs in terms of geographical coverage, number of nodes, administration capabilities, etc. Differ in regards to: collision domain isolation layer

More information

Hands-On Network Security: Practical Tools & Methods

Hands-On Network Security: Practical Tools & Methods Hands-On Network Security: Practical Tools & Methods Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 2 Network Fundamentals Roadmap Network

More information

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose CSEN 503 Introduction to Communication Networks Mervat AbuElkheir Hana Medhat Ayman Dayf **Slides are attributed to J. F. Kurose 1-2 Link Layer Link Layer: Introduction Some terminology: hosts and routers

More information

Link Layer and LANs. CMPS 4750/6750: Computer Networks

Link Layer and LANs. CMPS 4750/6750: Computer Networks Link Layer and LANs CMPS 4750/6750: Computer Networks 1 Outline overview (6.1) multiple access (6.3) link addressing: ARP (6.4.1) a day in the life of a web request (6.7) 2 Link layer: introduction terminology:

More information

Review. Some slides are in courtesy of J. Kurose and K. Ross

Review. Some slides are in courtesy of J. Kurose and K. Ross Review The Internet (IP) Protocol Datagram format IP fragmentation ICMP: Internet Control Message Protocol NAT: Network Address Translation Routing in the Internet Intra-AS routing: RIP and OSPF Inter-AS

More information

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks.

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks. Computer Networks Prof: Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 21 Local Internetworking Good day. Today we will be talking about

More information

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ... 1 Inter-networking COS 460 & 540 2 Problem 3 LAN s are great but We want to connect them together...across the world Inter-networking 4 Internet Protocol (IP) Routing The Internet Multicast* Multi-protocol

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

LAN Interconnection and Other Link Layer Protocols

LAN Interconnection and Other Link Layer Protocols LAN Interconnection and Other Link Layer Protocols Ethernet dominant link layer technology for local-area networks Ethernet frame structure Kai Shen Dept. of Computer Science, University of Rochester Ethernet

More information

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols Link Layer: Introduction daptors ommunicating hosts and routers are nodes links connect nodes wired links wireless links layer-2 packet is a frame, encapsulates datagram datagram controller sending host

More information

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Introduction to OSPF

Introduction to OSPF Campus Networking Introduction to OSPF Workshop Campus Layer-2 Networking Network Workshop Design These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license

More information

Lecture 8. Network Layer (cont d) Network Layer 1-1

Lecture 8. Network Layer (cont d) Network Layer 1-1 Lecture 8 Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets Network

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Switching & ARP Week 3

Switching & ARP Week 3 Switching & ARP Week 3 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 Many Slides courtesy of Tony Chen 1 Ethernet Using Switches In the last few years, switches have quickly

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND) 100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing

More information

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, Chapters 4.3.4

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Chapter 5 part 2 LINK LAYER. Computer Networks Timothy Roscoe Summer Networks & Operating Systems Computer Networks

Chapter 5 part 2 LINK LAYER. Computer Networks Timothy Roscoe Summer Networks & Operating Systems Computer Networks Chapter 5 part 2 LINK LAYER Computer Networks Timothy Roscoe Summer 2007 LAN technologies Data link layer so far services, error detection/correction, multiple access Next: LAN technologies LAN addressing,

More information