Addressing and Switching in the Link Layer
|
|
- Robert Green
- 5 years ago
- Views:
Transcription
1 Addressing and Switching in the Link Layer Stefano Vissicchio UCL Computer Science COMP00
2 Recap: We have done a full pass on the stack WWW phone...! SMTP HTTP RTP...! TCP UDP!! IP! When and how to transmit (e.g., Wifi and Ethernet)! ethernet PPP! CSMA async sonet...! copper fiber radio...!
3 Recap: We have done a full pass on the stack WWW phone...! SMTP HTTP RTP...! How to ensure reliability (error detection/correction codes, checksums, reliability protocols) TCP UDP!! IP!! ethernet PPP! CSMA async sonet...! copper fiber radio...!
4 Recap: We have done a full pass on the stack WWW phone...! Primitives for Internet communication (e.g., IP, congestion control, DNS) SMTP HTTP RTP...! TCP UDP!! IP!! ethernet PPP! CSMA async sonet...! copper fiber radio...! 4
5 We now focus on switching and routing How do hosts and network devices know where to send packets? Host bootstrapping (ARP, DHCP) Packet delivery from one hop to the next one (forwarding) Best path selection for each packet (routing) 5
6 We now focus on switching and routing How do hosts and network devices know where to send packets? Host bootstrapping (ARP, DHCP) This requires us to restart from the link layer Packet delivery from one hop to the next one (forwarding) Best path selection for each packet (routing) 6
7 Recap: What we ve covered on the link layer IP datagram Link-layer protocol Sending entity frame frame Receiving entity Enables the exchange of messages (frames) on a cable Functionality:. Framing: Determine start and end of bits and frames. Error control: Detect and/or correct errors. Reliable delivery: Deliver frames exactly once 4. Medium access control, for hosts to share the medium 7
8 Agenda We finish the functionality of the link layer, and tie it in to IP. Addressing. Bootstrapping a host. Extending LANs 8
9 Comparing addressing schemes Network layer address Identifier with Internet-wide scope -bit IP address, represented as 4 unsigned integers a.b.c.d Hierarchical address space Set by software, depending on the location Link layer address (MAC address) Identifier within a Local Area Network (LAN) Unique 48-bit address Usually a flat address space Burned in NIC ROM, also sometimes software settable 9
10 MAC addresses 48-bit globally unique addresses, assigned by NIC vendors Represented as 6 hexadecimal numbers xx:yy:zz:uu:mm:ww Top bytes specify the vendor Receiver s link layer passes a frame up (to network layer) if: The frame destination is the NIC address The frame destination is broadcast address (ff:ff:ff:ff:ff:ff) The card is in promiscuous mode (catches all the frames) 0
11 Agenda We finish the functionality of the link layer, and tie it in to IP. Addressing. Bootstrapping a host Providing addressing information (DHCP) Enabling hosts to send packets (ARP). Extending LANs
12 New hosts need bootstrapping information What IP address should the host use? How to contact the local DNS server? How to send packets to destinations? Local and remote??? host host... DNS host host... DNS...0/ router router router /4
13 DHCP and ARP avoid manual configuration Dynamic Host Configuration Protocol (DHCP) End host learns its address and basic information on LAN, namely: IP address, what s local, DNS servers, gateway...48 / host host...56 DNS host host... DNS...0/ router...9 router router /4
14 DHCP and ARP avoid manual configuration Address Resolution Protocol (ARP) Enables hosts to reach local destinations ARP provide mapping between IP and MAC address...48 / host host DNS A:F:BB:76:09:AD host host... DNS...0/ /4 router router router 4
15 Key ideas in both protocols Broadcasting: when in doubt, shout! Send query to all hosts in the LAN Caching: remember the past for a while Store the information you learn to reduce overhead Remember your own address and other host s addresses Soft state: eventually forget the past Associate a time-to-live (TTL) field to information On expiry either refresh or discard information Key for robustness in the face of unpredictable change 5
16 Bootstrapping problem Host doesn t have an IP address yet So, host doesn t know what source address to use Host doesn t know whom to ask for an IP address So, host doesn t know what destination address to use host host router router 6
17 DHCP solution: Client discovery message Broadcasting: shout to discover a server that can help Client sends a DHCP discover message The message is sent in broadcast Source IP address Destination MAC address ff:ff:ff:ff:ff:ff Destination IP address host host router router 7
18 DHCP solution: Server reply Any DHCP server on the LAN replies, with an offer DHCP offer messages contain Configuration parameters: proposed IP address, netmask, gateway, DNS server Lease time: duration of information validity host host DHCP server router router 8
19 DHCP solution: Relay agent reply Also, any DHCP relay agent replies with a DHCP offer A relay agent is configured with the IP address of a DHCP server on another network Unicasts client requests to the remote DHCP server Receives the server replies (sent in unicast to relay agent) Forwards such replies to the client s network host host DHCP server DHCP relay router router 9
20 DHCP solution: Client configuration Client accepts one of the received offers Client sends a DHCP request echoing the parameters DHCP server confirms with a DHCP ACK Other servers see they were not chosen They can safely offer the non-accepted parameters to other clients, afterwards...48 / host...56 host DNS host host... DNS...9 router router router 0
21 DHCP summary Arriving client DHCP discover (broadcast) DHCP offer (broadcast) DHCP ACK (broadcast) DHCP request (broadcast) DHCP server Why all broadcasts?
22 DHCP summary Arriving client DHCP discover (broadcast) DHCP offer (broadcast) DHCP ACK (broadcast) DHCP request (broadcast) DHCP server Why all broadcasts? Discover broadcast: client doesn t know DHCP server s identity Offer broadcast: client doesn t have an IP address yet Request broadcast: so other servers can see ACK broadcast: client still doesn t have an IP address
23 Why soft state? Clients can release the IP address, with DHCP release e.g., clean shutdown of the computer... But they might also not release the address at all e.g., the host crashes e.g., buggy client software Performance trade-offs Short lease time: returns inactive addresses quickly Long lease time: avoids overhead of frequent renewals
24 Now, the host knows things... ü IP address ü IP subnet mask ü IP address of Gateway router ü IP address of DNS server It should be able to send packets to other IP addresses, but How can it use the local network to send packets? 4
25 ... But the host do not know enough (yet) Hosts can send any packet: Directly to the destination, if it is local (same IP subnet) To the configured gateway, if the destination is remote Two questions to answer Is the destination local? Which is the destination MAC address to use?...48/...56 host host host... host DNS DNS...0/ router router router 5
26 Is the destination local? Use the netmask! Compare X = bitwise AND (destination IP address, netmask) Y = bitwise AND (own IP address, netmask) Destination is local if and only if X == Y...48/...56 host host host... host DNS DNS...0/ router router router 6
27 Which is the MAC address to use? Need to know the mapping between IP and MAC addresses For any possible machine in the LAN Including routers, needed to reach remote destinations There is a protocol to build such mappings: ARP...48/...56 A:F:BB:76:09:AD host host host... host DNS DNS...0/ router router router 7
28 Address Resolution Protocol (ARP) Every node maintains an ARP table Containing (IP address, link-layer address) pairs Hosts consult the table when sending a packet Map destination IP address to destination MAC address Encapsulate and transmit the data packet But what if the destination IP address is not in the table? 8
29 Address Resolution Protocol (ARP) To discover an unknown IP MAC address mapping Sender broadcasts: Who has IP address...56? (including its own link-layer and IP addresses) IP-address owner responds: IP address...56 is at link-layer address A:F:BB:76:09:AD (in unicast, to the source of the broadcast) Sender caches response in its ARP table 9
30 Example: Putting pieces together Host A wants to send a datagram to host B A already knows B s IP address from the DNS server Every packet is forwarded in two macro-steps:. A sends the packet to R. R forwards the packet to B A host 74:9:9c:e8:ff: :bd:d:c7:56:a B host Network /0 e6:e9:00:7:bb:4b router R a::f9:cd:06:9b Network /0 0
31 Step : A first sends to R Host A constructs an IP packet to send to B IP source , IP destination Host A knows about the default gateway R To reach destinations outside of /0 IP address of R, learned from DHCP A host 74:9:9c:e8:ff: :bd:d:c7:56:a B host Network /0 e6:e9:00:7:bb:4b router R a::f9:cd:06:9b Network /0
32 Step : A first sends to R A learns the MAC address of R s interface (if not in A s cache) ARP request: broadcast request for ARP response: R responds with e6:e9:00:7:bb:4b A encapsulates the built IP packet in a link-layer header A sends this frame to R, MAC address e6:e9:00:7:bb:4b A host 74:9:9c:e8:ff: :bd:d:c7:56:a B host Network /0 To: R A à B data e6:e9:00:7:bb:4b router R a::f9:cd:06:9b Network /0
33 Step : R forwards the datagram to B Router R s left interface receives the packet R extracts the IP packet from the Ethernet frame R sees the IP packet is destined to R consults its forwarding table Packet matches /0 via the right interface A host 74:9:9c:e8:ff: :bd:d:c7:56:a B host Network /0 e6:e9:00:7:bb:4b A à B router R data a::f9:cd:06:9b Network /0
34 Step : R forwards the datagram to B R s right interface learns the MAC address of B ARP request: broadcast request for ARP response: B responds with 49:bd:d:c7:56:a R encapsulates the packet and sends to B A host 74:9:9c:e8:ff: :bd:d:c7:56:a B host Network /0 e6:e9:00:7:bb:4b router R To: B A à B data a::f9:cd:06:9b Network /0 4
35 ARP (in)security Hazard: Any node can send an ARP reply and say whatever they want This enables several attacks Impersonation: malicious host impersonate the destination Legit receiver never sees a problem: never receives a packet! its NIC doesn t capture later packets, since they do not carry its link-layer address Man-in-the-middle: imposter receives frames from the source and updates them with correct link-layer address Sender and receiver never see a problem but the imposter gets to inspect (and alter?) all frames 5
36 ARP (in)security Hazard: Any node can send an ARP reply and say whatever they want This enables several attacks Impersonation: malicious host impersonate the destination The attacker might not even need to Legit receiver never sees a problem: never receives a packet! win a race with the legit destination its NIC doesn t capture later packets, since they do not (if the sender blindly believes ARP messages) carry its link-layer address Man-in-the-middle: imposter receives frames from the source and updates them with correct link-layer address Sender and receiver never see a problem but the imposter gets to inspect (and alter?) all frames 6
37 Agenda We finish the functionality of the link layer, and tie it in to IP. Addressing. Bootstrapping a host. Extending LANs Link-layer devices Self-learning algorithm The Spanning Tree Protocol 7
38 Is a LAN implemented as a single cable?...48 / host host DNS host host... DNS...0/ router...9 router router /4 Physical limits Signal weakens as it travels Performance shortcomings All hosts in the LAN must share the same bandwidth More hosts à more potential collisions 8
39 There are more devices than just routers HTTP host HTTP message host HTTP TCP TCP segment TCP intermediate system intermediate system IP IP datagram IP IP datagram IP Ethernet interface Ethernet interface SONET interface SONET interface Ethernet interface Ethernet interface Ethernet frame SONET frame Ethernet frame 9
40 There are more devices than just routers Routers: forward IP datagrams based on network-layer addresses in the IP header H H H H data Network Link Physical Router IP datagram H H data Switches (bridges): forward linklayer frames based on link-layer addresses in the link-layer header H H H H data Repeaters and hubs: re-broadcast all bits in the physical-layer frame Link Physical Switch Link layer frame H H H data Repeater Physical-layer frame H H H H data Physical H H H H data 40
41 Physical layer: repeaters Analog electronic devices that join cables together Continuously monitor electrical signals on each cable Transmit an amplified copy of the input signals Overcome weakening of signals as they travel Repeater 4
42 Physical layer: hubs Very similar to repeaters Operates at the physical layer too Join multiple input lines electrically Do not necessarily amplify the signal (but commonly do so) hub hub hub hub 4
43 Limitations of repeaters and hubs Do not separate collision domains They create one larger place where packets collide, since every bit is sent everywhere Do not circumvent limitations of the shared medium Maximum nodes and distances as in a single LAN for collision detection e.g., cannot go beyond 500 m in commercial Ethernet 4
44 Limitations of repeaters and hubs (cont d) Force limited aggregate throughput departments each get 0 Mbps independently if connect via hubs/repeaters, they must share 0 Mbps Cannot support multiple LAN technologies Repeaters/hubs do not buffer or interpret frames So, can t interconnect between different rates or formats e.g., no mixing 00 Mbit/s Ethernet and Gigabit Ethernet 44
45 Link layer: switches Switches connect two or more collision domains Each switch port defines a different collision domain Switches forward frames selectively Extract link-layer destination address from each frame Forward each frame to the appropriate collision domain Switch collision domain hub 45
46 Switches enable concurrent communication Host A can talk to C, while B talks to D B A switch C If host has (dedicated) point-to-point link to switch: Full duplex: each connection can send in both directions Completely avoids collisions ü No need for carrier sense, collision detection, ü Change in medium access control, but same framing D 46
47 Advantages of switches over hubs/repeaters Separates collision domains! Applies CSMA/CD in each LAN (not whole net) Extends the geographic span of the network Joins segments using different technologies Only forwards frames as needed Avoids unnecessary load on connected LANs Improves privacy by limiting scope of frames hosts can only snoop the traffic traversing their LAN 47
48 Disadvantages of switches wrt. repeaters/hubs Higher costs Switches are more complicated devices Introduce delay in forwarding frames Switches must receive, parse and decide where to forward every crossing frame Hence, introduces store-and-forward delay Ameliorated with cut-through switching Start forwarding after only header received 48
49 How do switches know where to send frames? Switches maintain a forwarding table Maps destination link-layer address to outgoing switch interface Goal: construct the switch table automatically Without intervention from network administrators Solution: Self-learning algorithm 49
50 Self learning algorithm: building the table Basic idea: build the forwarding table on the fly as new frames arrive at the switch Let s assume we start from an empty table B Switch forwarding table: Address Port Time-to-live A switch 4 C D 50
51 Self learning algorithm: building the table For any frame sent on a LAN, the switch will get to know where is located the source link-layer address: Maps the source address to its incoming port Stores the mapping in its forwarding table Switch forwarding table: B Address Port Time-to-live A A à B data A switch 4 C D Switch just learned how to reach A. 5
52 Self learning algorithm: building the table For any forwarding entry, the switch sets the time-to-live to eventually forget the address-port mapping e.g., if hosts move or disappear Switch forwarding table: B Address Port Time-to-live A minutes A à B data A switch 4 C D This is yet another example of soft state 5
53 Self learning algorithm: handling misses The switch uses flooding to forward frames for unfamiliar destination (e.g., B) or broadcast messages i.e., forwarding the frame out all ports except for the one on which the frame arrived after the reply, the switch will learn about the destination Switch forwarding table: B Address Port Time-to-live A minutes A à B data A switch 4 C D 5
54 Self learning algorithm: pseudo-code When switch receives a frame Look for link-layer destination address in the forwarding table if entry found for destination { if dest on segment from which frame arrived then drop frame else forward frame on interface indicated } else flood the frame Forward on all ports except the port on which the frame arrived 54
55 Self learning algorithm: pseudo-code When switch receives a frame Look for link-layer destination address in the forwarding table if entry found for destination { if dest on segment from which frame arrived then drop frame else forward frame on interface indicated } else flood the frame Forward on all ports except the port on which the frame arrived Is that safe? 55
56 Flooding can lead to loops Flooding can lead to forwarding loops and severe congestion e.g., if the network contains a cycle of switches Loops can be catastrophic for the extended LAN. Unlike IP, layer cannot stop loops. Loop à (exponential) increase of frames: broadcast storm Frames are broadcast, received and rebroadcast by each switch 56
57 Flooding can lead to loops Flooding can lead to forwarding loops and severe congestion e.g., if the network contains a cycle of switches Loops can be catastrophic for the extended LAN. Unlike IP, How layer can cannot we revise stop the loops self learning. Loop à algorithm (exponential) to avoid increase broadcast of frames: storms? broadcast storm Frames are broadcast, received and rebroadcast by each switch 57
58 Spanning Tree Protocol (STP) Early 980s: Digital Equipment Corporation (key Ethernet vendor) wanted to leverage the benefits of topology redundancy while avoiding broadcast storms Radia Perlman s idea: forward data frames over a tree no looping for frames flooded by the self learning algorithm Network, with cycles Forwarding tree, no cycles 58
59 Spanning Tree Protocol (STP) Requirements Connect every switch and LAN in the network Provide automatic setup and failure repair STP defines how switches build a spanning tree A spanning tree is a sub-graph that touches all vertices but contains no cycles Network, with cycles Spanning tree, no cycles 59
60 STP: Overview Input: physical network Users connect Ethernet switches and shared-medium Ethernet LANs arbitrarily (potentially, with cycles) STP defines a distributed algorithm, aimed to. Decide the root of the spanning tree. Compute the edges of the spanning tree. Support forwarding between any pair of LANs (over the tree) The STP algorithm relies on exchanging control-plane messages between switches 60
61 STP: Running Example We run STP over the example network shown here Nodes represent switches Links represents LANs 4 Note that this network has many cycles and possibly many hosts connected to each LAN 6
62 STP: Key ingredients of the algorithm Switches elect one root switch from which to build the tree Switch identifier = link-layer address on one port (interpreted as a number) 4 Switches block some ports from sending or receiving frames of Ethernet type IP (or other L data) B To form tree, switches exchange configuration messages (R, d, X): From switch X Proposing switch R (which is d hops away) as the root Configuration messages are never blocked Blocked ports B Root switch 6
63 STP: Key ingredients of the algorithm Switches elect one root switch from which to build the tree Switch identifier = link-layer address on one port (interpreted as a number) 4 Switches block some ports from sending or receiving Let s begin frames with of a simplified version of the Ethernet type IP (or full other STP L distributed data) algorithm To form tree, switches exchange configuration messages (R, d, X): From switch X Proposing switch R (which is d hops away) as the root Configuration messages are never blocked B Blocked ports Root switch B 6
64 Simplified STP: State at each switch Each switch X keeps the following state:. Its view of who the root is Initially, itself: X X Root id: X 64
65 Simplified STP: Startup and calculating the root Note: Initially, each switch X periodically sends (X, 0, X) from all its ports Root ID rule: Root ID r at switch X is the minimum of X and root IDs received at all ports Root id: 4 Root id: 4 Root id: Root id: 65
66 Simplified STP: Startup and calculating the root Note: Initially, each switch X periodically sends (X, 0, X) from all its ports Root ID rule: Root ID r at switch X is the minimum of X and root IDs received at all ports Switch sends (, 0, ); switch sets its root id to, switch ignores Root id: ß (, 0, ) 4 Root id: 4 Root id: Root id: 66
67 Simplified STP: Startup and calculating the root Note: Initially, each switch X periodically sends (X, 0, X) from all its ports Root ID rule: Root ID r at switch X is the minimum of X and root IDs received at all ports Switch sends (, 0, ); switches and set their root ids to Root id: 4 Root id: 4 Root id: ß (, 0, ) Root id: 67
68 Simplified STP: Startup and calculating the root Note: Initially, each switch X periodically sends (X, 0, X) from all its ports Root ID rule: Root ID r at switch X is the minimum of X and root IDs received at all ports Switch sends (, 0, ); switch 4 sets its root id to, others ignore Root id: 4 Root id: Root id: Root id: 68
69 STP: Startup and calculating the root Note: Initially, each switch X periodically sends (X, 0, X) from all its ports Root ID rule: Root ID r at switch X is the minimum of X and root IDs received at all ports Switch 4 sends (4, 0, 4); switch ignores Not yet agreeing on the identity of the root: we need to propagate information multiple hops through the network Root id: Root id: 4 Root id: Root id: 69
70 Simplified STP: State at each switch Each switch X keeps the following state:. Its view of who the root is Initially, itself: X. Its configuration message to send Initially, announcing itself as root with zero distance to root: (X, 0, X) X Root id: X Msg: (X, 0, X) Recall: (root ID, dist to root, sent from) 70
71 Simplified STP: Calculating the message Switch X finds its distance from the root (d):. If X thinks it is the root, d ß 0. Otherwise, d ß the minimum distance from messages received matching X s root id (call it r), plus one Configuration message rule: Switch X sets its configuration message to (r, d, X). If configuration message changes, sends updated message immediately Root id: Msg: (, 0, ) 4 Root id: 4 Msg: (4, 0, 4) Root id: Msg: (, 0, ) Root id: Msg: (, 0, ) Recall: (root ID, dist to root, sent from) 7
72 Simplified STP: Calculating the message Switch X finds its distance from the root (d):. If X thinks it is the root, d ß 0. Otherwise, d ß the minimum distance from messages received matching X s root id (call it r), plus one Configuration message rule: Switch X sets its configuration message to (r, d, X). If configuration message changes, sends updated message immediately Switch sends (, 0, ), switches and update their root ids and msgs Recall: (root ID, dist to root, sent from) Root id: Msg: (,, ) Root id: Msg: (, 0, ) 4 Root id: Msg: (4, 0, 4) Root id: Msg: (,, ) 7
73 Simplified STP: Calculating the message Switch X finds its distance from the root (d):. If X thinks it is the root, d ß 0. Otherwise, d ß the minimum distance from messages received matching X s root id (call it R), plus one Configuration message rule: Switch X sets its configuration message to (R, d, X). If configuration message changes, sends updated message immediately Switch sends (,, ), switch 4 updates its root id and message Recall: (root ID, dist to root, sent from) Root id: Msg: (,, ) Root id: Msg: (, 0, ) 4 Root id: Msg: (,, 4) Root id: Msg: (,, ) 7
74 Simplified STP: Calculating the message Switch X finds its distance from the root (d):. If X thinks it is the root, d ß 0. Otherwise, d ß the minimum distance from messages received matching X s root id (call it r), plus one Configuration message rule: Switch X sets its configuration message to (r, d, X) 4 Root id: Msg: (,, 4) All switches agree on the root identifier. Root id: Msg: (,, ) Now they must decide which ports to block to form the spanning tree. Root id: Msg: (,, ) Root id: Msg: (, 0, ) Recall: (root ID, dist to root, sent from) 74
75 STP: Port status All switches connected to a Ethernet LAN (or the two at the ends of a cable) agree on a single designated port 4 Root id: Msg: (,, 4) Designated port: The port on the shortest path from the LAN or cable to the root is the designated port (D) D Root id: Msg: (,, ) D The designated port forwards frames from the LAN to the root Only designated ports send configuration messages D Root id: Msg: (, 0, ) Root id: Msg: (,, ) D Recall: (root ID, dist to root, sent from) 75
76 STP: Port status Root port: Each non-root switch notes which of its ports is on the shortest path to the root; this port is the root port (R) Recall: (root ID, dist to root, sent from) R D R D Root id: Msg: (,, ) Root id: Msg: (, 0, ) 4 Root id: Msg: (,, 4) Root id: Msg: (,, ) D D R 76
77 STP: Port status Blocked port: If neither designated nor root, a port is a blocked port (B), R 4 Root id: Msg: (,, 4) Blocked ports don t forwarding data traffic. R D Root id: Msg: (,, ) B D B Root id: Msg: (,, ) R D Root id: Msg: (, 0, ) D Recall: (root ID, dist to root, sent from) 77
78 STP: State at each switch Each switch X keeps the following state:. Its view of who the root is Initially, itself: X. Its configuration message to send Initially, announcing itself as root with zero distance to root: (X, 0, X) X Root id: X Msg: (X, 0, X) D: (X, 0, X). For each of X s ports: Whether designated (D), root (R), or blocking (B) data traffic Initially, designated (D) Best configuration message heard on that port Initially, its own configuration message (X, 0, X) 78
79 STP: Designated port rule At a switch, for each port p: Consider all configuration messages received on port p and the configuration message the switch would send If switch receives a better configuration message on a port p, don t send configuration messages on port p Else, p is designated: send configuration message on p Rule for comparing configuration messages: (R, d, X ) better than (R, d, X ) if R < R or (R = R and d < d ) or (R = R and d = d and X < X ) 79
80 STP: Complete example All switches begin thinking they are root with all ports in the designated state D: (4,0,4) 4 Root id: 4 Msg: (4,0,4) D: (,0,) D: (,0,) Root id: Msg: (,0,) D: (,0,) D: (,0,) D: (,0,) Root id: Msg: (,0,) D: (,0,) Recall: (root ID, dist to root, sent from) D: (,0,) Root id: Msg: (,0,) D: (,0,) 80
81 STP: Complete example All switches begin thinking they are root with all ports in the designated state Switch sends (,0,), switches and update their root ids, ports, and msgs Switch breaks tie between the two copies of (,0,) locally by numbering its ports Each switch s port remembers the best configuration message seen so far Recall: (root ID, dist to root, sent from) R: (,0,) ß (, 0, ) D: (,0,) D: (4,0,4) D: (,0,) Root id: Msg: (,,) B: (,0,) Root id: Msg: (,0,) 4 Root id: 4 Msg: (4,0,4) D: (,0,) D: (,0,) Root id: Msg: (,,) R: (,0,) D: (,0,) (, 0, ) à 8
82 STP: Complete example Switch sends (,,) from its designated ports: Switch 4 updates its root id and message Switch, port remains designated because Switch s message (,,) is better than (,,) R: (,0,) (,,) à R: (,,) D: (,0,) Root id: Msg: (,,) B: (,0,) 4 Root id: Msg: (,,4) D: (,0,) D: (,,) Root id: Msg: (,,) R: (,0,) Recall: (root ID, dist to root, sent from) D: (,0,) Root id: D: (,0,) Msg: (,0,) 8
83 STP: Complete example Switch sends (,,) from port only Switch blocks its port since (,,) is better than its message (,,), and it prefers port as its root port. R: (,0,) R: (,,) D: (,0,) Root id: Msg: (,,) B: (,0,) 4 Root id: Msg: (,,4) B: (,,) D: (,,) Root id: Msg: (,,) R: (,0,) Recall: (root ID, dist to root, sent from) D: (,0,) Root id: Msg: (,0,) D: (,0,) 8
84 STP: Dynamics When do switches send configuration messages? If you think you re the root, send periodically with parameter hello time (two seconds recommended in 80.d) Other switches send on all designated ports upon receiving root s message How does the algorithm adapt to topology changes? State table contains age field, which is updated continuously Aging rule: If age reaches a threshold max age (0 sec in 80.d), discard that table entry and recalculate using all rules What happens if max age is too big? Too small? Recalculate when receive better or newer configuration message on port p (resulting in a table entry being overwritten) 84
85 STP: Handling failures Suppose the Ethernet LAN fails R: (,,) 4 Root id: Msg: (,,4) R: (,0,) D: (,0,) Root id: Msg: (,,) B: (,0,) B: (,,) D: (,,) Root id: Msg: (,,) R: (,0,) Recall: (root ID, dist to root, sent from) D: (,0,) Root id: Msg: (,0,) D: (,0,) 85
86 STP: Handling failures Suppose the Ethernet LAN fails Switch : Stops hearing the root s messages through port, so it becomes designated Port becomes root Updates its own message D: (,,) R: (,,) D: (,0,) Root id: Msg: (,,) B: (,0,) 4 Root id: Msg: (,,4) R: (,,) D: (,,) Root id: Msg: (,,) R: (,0,) Recall: (root ID, dist to root, sent from) D: (,0,) Root id: Msg: (,0,) D: (,0,) 86
87 STP: Handling failures Suppose the Ethernet LAN fails Switch 4: Updates message heard on root port Updates its own message Switch : Stops hearing the root s messages through port, so it becomes designated D: (,,) R: (,,) D: (,0,) Root id: Msg: (,,) D: (,,) 4 Root id: Msg: (,,4) R: (,,) D: (,,) Root id: Msg: (,,) R: (,0,) Recall: (root ID, dist to root, sent from) D: (,0,) Root id: Msg: (,0,) D: (,0,) 87
88 STP: Handling topology change Suppose we fix the LAN. Now we have created (temporary) forwarding loops R: (,,) 4 Root id: Msg: (,,4) This also happens when switches are powered-up D: (,,) D: (,0,) Root id: Msg: (,,) D: (,,) R: (,,) D: (,,) Root id: Msg: (,,) R: (,0,) Recall: (root ID, dist to root, sent from) D: (,0,) Root id: Msg: (,0,) D: (,0,) 88
89 STP: Pre-forwarding port state Suppose any of the following apply to a port:. Transition from B à D. Any newly-connected port (detect Ethernet carrier). Any port on a freshlypowered switch The port then enters the preforwarding (PF) state, where: It sends configuration messages and transitions to blocked and root states as if designated But it does not forward data frames, so can t create loops PF: (,,) PF: (,0,) R: (,,) D: (,0,) Root id: Msg: (,,) PF: (,,) Root id: Msg: (,0,) 4 Root id: Msg: (,,4) R: (,,) D: (,,) Root id: Msg: (,,) R: (,0,) D: (,0,) 89
90 STP: Pre-forwarding port state Switches returns to old state R: (,,) 4 Root id: Msg: (,,4) R: (,0,) D: (,0,) Root id: Msg: (,,) PF: (,,) B: (,,) D: (,,) Root id: Msg: (,,) R: (,0,) Recall: (root ID, dist to root, sent from) PF: (,0,) Root id: Msg: (,0,) D: (,0,) 90
91 STP: Pre-forwarding port state Switch returns to old state Switch returns to old state R: (,,) 4 Root id: Msg: (,,4) R: (,0,) D: (,0,) Root id: Msg: (,,) B: (,0,) B: (,,) D: (,,) Root id: Msg: (,,) R: (,0,) Recall: (root ID, dist to root, sent from) PF: (,0,) Root id: Msg: (,0,) D: (,0,) 9
92 STP: Pre-forwarding port state Switch returns to old state Switch returns to old state Switch 4 returns to old state R: (,,) 4 Root id: Msg: (,,4) Now switch, port remains in the pre-forwarding state R: (,0,) D: (,0,) Root id: Msg: (,,) B: (,0,) R: (,,) D: (,,) Root id: Msg: (,,) R: (,0,) Recall: (root ID, dist to root, sent from) PF: (,0,) Root id: D: (,0,) Msg: (,0,) 9
93 STP: Leaving the pre-forwarding state If still in PF state after some number of seconds (forwarding delay parameter) then the port becomes designated (D) How long should forwarding delay be? Long enough for the entire spanning tree to re-form, i.e.: Twice the maximum transit time across the extended LAN 0 seconds in 80.d R: (,0,) R: (,,) D: (,0,) Root id: Msg: (,,) B: (,0,) 4 Root id: Msg: (,,4) B: (,,) D: (,,) Root id: Msg: (,,) R: (,0,) D: (,0,) Root id: D: (,0,) Msg: (,0,) 9
94 Final thoughts: Ethernet evolution Everything has changed over the years, but the link layer frame format From the coaxial cable shared medium to switches From Mbit/s experimental Ethernet to 00 Gbit/s recent standards From electrical signaling to optical Lesson: The right interface can accommodate many changes Implementation is hidden behind interface 94
Address and Switching in the Link Layer
Address and Switching in the Link Layer Brad Karp (slides contributed by Kyle Jamieson, Scott Shenker, and adapted from Kurose and Ross) UCL Computer Science CS 05/GZ01 18 th November 014 1 The link layer:
More informationECE 158A: Lecture 13. Fall 2015
ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit
More informationSwitching and Forwarding Reading: Chapter 3 1/30/14 1
Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any
More informationCS 457 Lecture 11 More IP Networking. Fall 2011
CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More informationMissing pieces + Putting the pieces together
Missing pieces + Putting the pieces together EE 122, Fall 2013 Sylvia Ratnasamy http://inst.eecs.berkeley.edu/~ee122/ Material thanks to Ion Stoica, Scott Shenker, Jennifer Rexford, Nick McKeown, and many
More informationLecture 11: Addressing, Framing, and Switching in the Link Layer CS 3035/GZ01: Networked Systems Kyle Jamieson
Lecture 11: Addressing, Framing, and Switching in the Link Layer CS 05/GZ01: Networked Systems Kyle Jamieson Department of Computer Science University College London The link layer: FuncFonality IP datagram
More informationPrinciples behind data link layer services
Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More informationPrinciples behind data link layer services:
Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example
More informationLink layer: introduction
Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,
More informationCS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017
CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology
More informationCommunication Networks
Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) March 19 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks Reliable
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationEthernet. EE 122: Intro to Communication Networks. Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz
Ethernet EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationLast time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing
Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol
More informationThe Link Layer and LANs: Ethernet and Swiches
The Link Layer and LNs: Ethernet and Swiches EECS3214 2018-03-21 Link layer, LNs: outline 6.1 introduction, services 6.2 error detection, correction 6.3 multiple access protocols 6.4 LNs addressing, RP
More informationCisco Cisco Certified Network Associate (CCNA)
Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data
More informationMissing pieces + Putting the pieces together
Missing pieces + Putting the pieces together CS 168, Fall 2014 Sylvia Ratnasamy Material thanks to Ion Stoica, Scott Shenker, Jennifer Rexford, Nick McKeown, and many other colleagues Today Switched Ethernet
More informationPrinciples behind data link layer services:
Data Link Layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: multiple access Link layer addressing Reliable data transfer, flow control: Done!
More informationCS 455/555 Intro to Networks and Communications. Link Layer Addressing, Ethernet, and a Day in the Life of a Web Request
CS 455/555 Intro to Networks and Communications Link Layer Addressing, ernet, and a Day in the Life of a Web Request Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu
More informationLAN Interconnection and Other Link Layer Protocols
LAN Interconnection and Other Link Layer Protocols Ethernet dominant link layer technology for local-area networks Ethernet frame structure Kai Shen Dept. of Computer Science, University of Rochester Ethernet
More informationCSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose
CSEN 503 Introduction to Communication Networks Mervat AbuElkheir Hana Medhat Ayman Dayf **Slides are attributed to J. F. Kurose 1-2 Link Layer Link Layer: Introduction Some terminology: hosts and routers
More informationIntroduction to Internetworking
Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any
More informationCSC 4900 Computer Networks: Link Layer (2)
CSC 4900 Computer Networks: Link Layer (2) Professor Henry Carter Fall 2017 Link Layer 6.1 Introduction and services 6.2 Error detection and correction 6.3 Multiple access protocols 6.4 LANs addressing,
More informationCommunication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, Chapters 4.3.4
More information19: Networking. Networking Hardware. Mark Handley
19: Networking Mark Handley Networking Hardware Lots of different hardware: Modem byte at a time, FDDI, SONET packet at a time ATM (including some DSL) 53-byte cell at a time Reality is that most networking
More informationSwitching & ARP Week 3
Switching & ARP Week 3 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 Many Slides courtesy of Tony Chen 1 Ethernet Using Switches In the last few years, switches have quickly
More informationL2 Addressing and data plane. Benjamin Baron
L2 Addressing and data plane Benjamin Baron benjamin.baron@lip6.fr Goals of Today s Lecture Devices that shuttling packets at different layers - Repeaters and hubs - Bridges and switches - Routers Switch
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.1: Internetworking Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Stefano Vissicchio UCL Computer Science COMP0023 Today Transport Concepts Layering context Transport goals Transport mechanisms and design choices TCP Protocol
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationGuide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols
Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP
More informationObjectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various
More informationMore on Link Layer. Recap of Last Class. Interconnecting Nodes in LAN (Local-Area Network) Interconnecting with Hubs. Computer Networks 9/21/2009
More on Link Layer Kai Shen Recap of Last Class Ethernet dominant link layer technology for local-area l networks Ethernet frame structure Ethernet multiple access control CSMA/CD, exponential back-off
More informationChapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1
Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is
More informationHubs. twisted pair. hub. 5: DataLink Layer 5-1
Hubs Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSMA/CD at : adapters detect collisions provides net management
More informationAdministrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)
Administrivia CSC458 Lecture 4 Bridging LANs and IP Homework: # 1 due today # 2 out today and due in two weeks Readings: Chapters 3 and 4 Project: # 2 due next week Tutorial today: Joe Lim on project 2
More informationCommunication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationLecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationLecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 9 The Data Link Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Physical Addresses Physical (or LAN or MAC) address: 48 bit string Hexadecimal representation
More informationNetwork Model. Why a Layered Model? All People Seem To Need Data Processing
Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationCS 3516: Advanced Computer Networks
Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook
More informationTelematics I. Chapter 6 Internetworking. (Acknowledement: These slides have been compiled from H. Karl s set of slides)
Telematics I Chapter 6 Internetworking (Acknowledement: These slides have been compiled from H. Karl s set of slides) 1 Goals of This Chapter So far: we can communicate between nodes all connected directly
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)
More informationProfessor Yashar Ganjali Department of Computer Science University of Toronto.
Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Announcements Problem Set 1 is posted on class web page. Problems
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationEPL606. Internetworking. Part 2a. 1Network Layer
EPL606 Internetworking Part 2a The majority of the slides in this course are adapted from the accompanying slides to the books by Larry Peterson and Bruce Davie and by Jim Kurose and Keith Ross. Additional
More informationLecture 9: Bridging & Switching"
Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link
More informationSome portions courtesy Srini Seshan or David Wetherall
CSE 123 Computer Networks Fall 2009 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Misc Homework solutions have been posted I ll post a sample
More informationSubnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction
The Network layer Host, network layer functions: Network layer Routing protocols path selection R, OSPF, BGP Transport layer: TCP, forwarding table Link layer physical layer protocol addressing conventions
More informationICS 451: Today's plan
ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network
More informationWhat is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals
What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationFull file at
Guide to Networking Essentials, Sixth Edition 2-1 Chapter 2 Network Hardware Essentials At a Glance Instructor s Manual Table of Contents Overview Objectives Tips Quick Quizzes Class Discussion Topics
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!
CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also
More informationTop-Down Network Design
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Link Layer, Switches, VLANS, MPLS, Data Centers Sec 6.4 to 6.7 Prof. Lina Battestilli Fall 2017 Chapter 6 Outline Link layer and LANs: 6.1 introduction,
More informationCSCD 330 Network Programming Spring 2017
CSCD 330 Network Programming Spring 2017 Lecture 18 Link Layer Protocols Continued Who is this? Reading: Chapter 5 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright
More informationChapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved
More informationPUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R
PUCPR Internet Protocol Address Resolution and Routing Edgard Jamhour 2014 E N G L I S H S E M E S T E R 1. Address Resolution The IP address does not identify, indeed, a computer, but a network interface.
More informationIntroduction to Communication Networks Spring Unit 13 Network extensions Bridges.
Introduction to Communication Networks Spring 2007 Unit 13 Network extensions Bridges. Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Slides from lectures
More informationCS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal
CS4450 Computer Networks: Architecture and Protocols Lecture 20 Pu+ng ALL the Pieces Together Spring 2018 Rachit Agarwal What is a computer network? A set of network elements connected together, that implement
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationCompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 7: Switching technologies Chapter 3.1 Xiaowei Yang xwy@cs.duke.edu Types of switching Datagram Virtual circuit Source routing Today Bridges and LAN switches
More informationCSCI Computer Networks
CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)
More informationCompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,
More informationInternet Architecture and Experimentation
Internet Architecture and Experimentation Today l Internet architecture l Principles l Experimentation A packet switched network Modern comm. networks are packet switched Data broken into packets, packet
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationThe trace is here: https://kevincurran.org/com320/labs/wireshark/trace-dhcp.pcap
Lab Exercise DHCP Objective To see how DHCP (Dynamic Host Configuration Protocol) works. The trace is here: https://kevincurran.org/com320/labs/wireshark/trace-dhcp.pcap Network Setup Recall that DHCP
More informationThe Interconnection Structure of. The Internet. EECC694 - Shaaban
The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationLayer 2 functionality bridging and switching
Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Last Time How do multiple hosts share a single channel?
More informationLink Layer and LANs. CMPS 4750/6750: Computer Networks
Link Layer and LANs CMPS 4750/6750: Computer Networks 1 Outline overview (6.1) multiple access (6.3) link addressing: ARP (6.4.1) a day in the life of a web request (6.7) 2 Link layer: introduction terminology:
More informationRouting. Information Networks p.1/35
Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual
More informationChapter 4: Network Layer
Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 2. Direct Link Networks Link Service and Framing Error Detection and Reliable Transmission HDLC, PPP, and SONET Token Ring Ethernet Bridges and
More informationChapter 6 The Link Layer and LANs
Chapter 6 The Link Layer and LANs A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today: Link Layer (cont.) Framing Reliability Error correction Sliding window Medium
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.13 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram
More informationECSE 414 Fall 2014 Final Exam Solutions
ECSE 414 Fall 2014 Final Exam Solutions Question 1 a. The five main layers of the internet protocol stack, along with the service provided by each, and the place where each is implemented are as follows:
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationInternetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS
Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS 1. General (5p) a) The so-called hourglass model (sometimes referred to as a wine-glass ) has been used
More informationTHE INTERNET PROTOCOL INTERFACES
THE INTERNET PROTOCOL The Internet Protocol Stefan D. Bruda Winter 2018 A (connectionless) network protocol Designed for use in interconnected systems of packet-switched computer communication networks
More informationInternetworking Part 1
CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:
More informationThe Internetworking Problem. Internetworking. A Translation-based Solution
Cloud Cloud Cloud 1 The Internetworking Problem Internetworking Two nodes communicating across a network of networks How to transport packets through this heterogeneous mass? A B The Internetworking Problem
More informationThe Internet Protocol
The Internet Protocol Stefan D. Bruda Winter 2018 THE INTERNET PROTOCOL A (connectionless) network layer protocol Designed for use in interconnected systems of packet-switched computer communication networks
More informationRouter Architecture Overview
Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized
More informationDa t e: August 2 0 th a t 9: :00 SOLUTIONS
Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,
More information