Address and Switching in the Link Layer

Size: px
Start display at page:

Download "Address and Switching in the Link Layer"

Transcription

1 Address and Switching in the Link Layer Brad Karp (slides contributed by Kyle Jamieson, Scott Shenker, and adapted from Kurose and Ross) UCL Computer Science CS 05/GZ01 18 th November 014 1

2 The link layer: Func0onality IP datagram Link- layer protocol Sending host frame frame Receiving host Enables the exchange of messages (frames) between end hosts Func7onality: 1. Framing: Determine start and end of bits and frames. Error control: Detect and/or correct errors. Reliable delivery: Deliver frames exactly once 4. Medium access control: Control hosts access to a shared medium, if applicable (medium access control)

3 Today We finish the func7onality of the link layer, and 7e it in to IP 1. Addressing. Repeaters, hubs, and switches. Bootstrapping a host

4 Comparing addressing schemes Network layer address (IP address) Func7on: move datagram to des7na7on network - bit address, doned quad nota7on a.b.c.d where each component is an eight- bit unsigned integer Hierarchical address space Link layer address (MAC address, Ethernet address): Func7on: move frame from one point to another point on the same network Unique 48- bit address (in most LANs) Burned in NIC ROM, also some7mes soyware senable Usually a flat address space 4

5 Ethernet addresses 48- bit source and des7na7on addresses Receiver s link layer passes frame up to network- level protocol: If des7na7on address matches the adaptor s Or the des7na7on address is the broadcast address (ff:ff:ff:ff:ff:ff) Or the card is in a mode of opera7on that receives all frames (promiscuous mode) Addresses are globally unique Assigned by NIC vendors (top three bytes specify vendor) 5

6 Today We finish the func7onality of the link layer, and 7e it in to IP 1. Addressing. Repeaters, hubs, and switches Comparison Self- learning switches The Spanning Tree Protocol. Bootstrapping a host 6

7 Message, segment, datagram, and frame host host HTTP HTTP TCP TCP IP IP IP IP Ethernet interface Ethernet interface SONET interface SONET interface Ethernet interface Ethernet interface 7

8 Message, segment, datagram, and frame HTTP host HTTP message host HTTP TCP TCP IP IP IP IP Ethernet interface Ethernet interface SONET interface SONET interface Ethernet interface Ethernet interface 8

9 Message, segment, datagram, and frame HTTP host HTTP message host HTTP TCP TCP segment TCP IP IP IP IP Ethernet interface Ethernet interface SONET interface SONET interface Ethernet interface Ethernet interface 9

10 Message, segment, datagram, and frame HTTP host HTTP message host HTTP TCP TCP segment TCP IP IP datagram IP IP datagram IP IP datagram IP Ethernet interface Ethernet interface SONET interface SONET interface Ethernet interface Ethernet interface 10

11 Message, segment, datagram, and frame HTTP host HTTP message host HTTP TCP TCP segment TCP IP IP datagram IP IP datagram IP IP datagram IP Ethernet interface Ethernet interface SONET interface SONET interface Ethernet interface Ethernet interface Ethernet frame SONET frame Ethernet frame 11

12 Different devices switch on different informa0on Routers: forward IP datagrams based on network- layer addresses in the IP header H H H H data Network Link Physical Router IP datagram H H data Switches (Bridges): forward link- layer frames based on link- layer addresses in the link- layer header H H H H Repeaters/Hubs: rebroadcast all bits in the physical- layer frame data Link Physical Switch Link layer frame H H H data Hub Physical- layer frame H H H H data Physical H H H H data 1

13 Physical Layer: Repeaters Distance limita7on in local- area networks Electrical signal becomes weaker as it travels Imposes a limit on the length of a LAN In addi7on to limit imposed by collision detec7on Repeaters join LANs together Analog electronic device Con7nuously monitors electrical signals on each LAN Transmits an amplified copy Repeater 1

14 Physical Layer: Hubs Joins mul7ple input lines electrically Do not necessarily amplify the signal Very similar to repeaters Also operate at the physical layer hub hub hub hub 14

15 Limita0ons of repeaters and hubs One large place where packets collide (collision domain), since every bit is sent everywhere So, aggregate throughput is limited e.g., three departments each get 10 Mbps independently and then if connect via a hub must share 10 Mbps Cannot support mul7ple LAN technologies Repeaters/hubs do not buffer or interpret frames So, can t interconnect between different rates or formats e.g., no mixing 100 Mbit/s Ethernet and Gigabit Ethernet Limita7ons on maximum nodes and distances Does not circumvent limita7ons of the shared medium e.g., s7ll cannot go beyond 500 m in commercial Ethernet 15

16 Link Layer: Switches Switches also connect two or more LANs at the link layer Extracts des7na7on address from the frame Looks up the des7na7on in a table Forwards the frame to the appropriate LAN segment Or point- to- point link, for higher- speed Ethernet Each port is its own collision domain (if not a link to one host) Switch collision domain hub Extended LAN 16

17 Switches and concurrent communica0on Host A can talk to C, while B talks to D B A switch C If host has (dedicated) point- to- point link to switch: Full duplex: each connec7on can send in both direc7ons Completely avoids collisions! No need for carrier sense, collision detec7on, and so on! Change in medium access control, but same framing D 17

18 Switches: Advantages over hubs and repeaters Only forwards frames as needed Filters frames to avoid unnecessary load on segments Sends frames only to segments that need to see them Extends the geographic span of the network Separate collision domains allow longer distances Improves privacy by limi7ng scope of frames Hosts can snoop the traffic traversing their segment but not all the rest of the traffic Applies CSMA/CD in segment (not whole net) Smaller collision domain Joins segments using different technologies 18

19 Disadvantages over hubs and repeaters Higher cost More complicated devices that cost more money Delay in forwarding frames Bridge/switch must receive and parse the frame and perform a look- up to decide where to forward Introduces store- and- forward delay Can ameliorate using cut- through switching Start forwarding ayer only header received Need to learn where to forward frames Bridge/switch needs to construct a forwarding table Ideally, without interven7on from network administrators Solu7on: Self- learning algorithm 19

20 Mo0va0on for self learning Benefit if switch forwards frame only on segment(s) that need it Allows concurrent use of other links Switch forwarding table Maps des0na0on link- layer address to outgoing interface Goal: construct the switch table automa7cally B A switch C D 0

21 Self learning algorithm: Building the table When a frame (e.g., from A to B) arrives at the switch: Inspect the source link- layer address Associate that address with the incoming switch port Store the mapping in the switch table Use ;me- to- live field to eventually forget the mapping an amount of 7me later equal to its value This is an example of sox state A A " B data 1 switch 4 B Switch forwarding table: Address Port Time- to- live A 1 minutes C D Switch just learned how to reach A. 1

22 Self learning algorithm: Handling misses When frame arrives with unfamiliar des7na7on (e.g., B) Forward the frame out all ports except for the one on which the frame arrived This is called flooding Hopefully, this case won t happen very oyen When e.g. B replies, switch will learn that node, too Switch forwarding table: B Address Port Time- to- live A 1 minutes A " B data 1 A switch 4 C D

23 Self- learning algorithm When switch receives a frame: index into the forwarding table using link- layer des0na0on address if entry found for des7na7on { if dest on segment from which frame arrived then drop frame else forward frame on interface indicated } else flood the frame Forward on all ports except the port on which the frame arrived

24 Self- learning algorithm When switch receives a frame: index into the forwarding table using link- layer des0na0on address if entry found for des7na7on { if dest on segment from which frame arrived then drop frame else forward frame on interface indicated } else flood the frame Forward on all ports except the port on which the frame arrived Problems? 4

25 Flooding can lead to loops Switches some7mes need to flood frames: Upon receiving a frame with an unfamiliar des7na7on Upon receiving a frame sent to the broadcast address Flooding can lead to forwarding loops e.g., if the network contains a cycle of switches Either accidentally, or by design for higher reliability This is catastrophic, for two reasons: 1. Unlike IP, layer has no way of preven7ng frame looping. Ethernet duplicates frames, leading to an exponen7al increase, quickly crashing the extended LAN (this is called a broadcast storm) 5

26 Flooding can lead to loops Switches some7mes need to flood frames: Upon receiving a frame with an unfamiliar des7na7on Upon receiving a frame sent to the broadcast address Flooding can lead to forwarding loops e.g., if the network contains a cycle of switches Either accidentally, or by design for higher reliability How can we revise the bridge learning This is catastrophic, algorithm for two to reasons: avoid broadcast storms? 1. Unlike IP, layer has no way of preven7ng frame looping. Ethernet duplicates frames, leading to an exponen7al increase, quickly crashing the extended LAN (this is called a broadcast storm) 6

27 The spanning tree protocol (STP) Early 1980s: Digital Equipment Corpora7on, a key Ethernet vendor, wanted to leverage the benefits of loops while avoiding broadcast storms Radia Perlman s idea: Switches agree on a loop- free and connected spanning tree Spanning tree: a sub- graph that touches all ver7ces but contains no cycles Graph with cycles Spanning tree has no cycles Once the spanning tree is formed: Switches use the switch learning algorithm to forward data frames over the tree links only 7

28 Spanning Tree Protocol (STP): Overview Users connect Ethernet switches and shared- medium Ethernet LANs together Arbitrarily, possibly crea7ng forwarding loops 4 Need a distributed algorithm so that: 1. Switches cooperate to build the spanning tree. Switches adapt automa7cally when failures occur 1 8

29 STP: Key ingredients of the algorithm Switches elect one root switch from which to build the tree Switch iden7fier = link- layer address on one port Switches block some ports from sending or receiving frames of Ethernet type IP (or other L data) To form tree, switches exchange configura;on messages (R, d, X): From switch X Proposing switch R (which is d hops away) as the root Configura7on messages are never blocked B Blocked ports B 1 4 Root switch 9

30 STP: Key ingredients of the algorithm Switches elect one root switch from which to build the tree Switch iden7fier = link- layer address on one port 4 Switches block some ports from sending or receiving frames of Ethernet type Let s IP (or begin other with L data) a simplified version of the full STP distributed algorithm To form tree, switches exchange configura;on messages (R, d, X): From switch X Proposing switch R (which is d hops away) as the root Configura7on messages are never blocked B Blocked ports 1 B Root switch 0

31 Simplified STP: State at each switch Each switch X keeps the following state: 1. Its view of who the root is Ini7ally, itself: X X Root id: X 1

32 Simplified STP: Startup and calcula0ng the root Note: Ini7ally, each switch X periodically sends (X, 0, X) from all its ports Root ID rule: Root ID r at switch X is the minimum of X and root IDs received at all ports Root id: 4 Root id: 4 Root id: 1

33 Simplified STP: Startup and calcula0ng the root Note: Ini7ally, each switch X periodically sends (X, 0, X) from all its ports Root ID rule: Root ID r at switch X is the minimum of X and root IDs received at all ports Switch sends (, 0, ); switch sets its root id to, switch 1 ignores Root id: # (, 0, ) 4 Root id: 4 Root id: 1

34 Simplified STP: Startup and calcula0ng the root Note: Ini7ally, each switch X periodically sends (X, 0, X) from all its ports Root ID rule: Root ID r at switch X is the minimum of X and root IDs received at all ports Switch 1 sends (1, 0, 1); switches and set their root ids to 1 4 Root id: 4 # (1, 0, 1) 1 4

35 Simplified STP: Startup and calcula0ng the root Note: Ini7ally, each switch X periodically sends (X, 0, X) from all its ports Root ID rule: Root ID r at switch X is the minimum of X and root IDs received at all ports Switch sends (, 0, ); switch 4 sets its root id to, others ignore 4 Root id: 1 5

36 STP: Startup and calcula0ng the root Note: Ini7ally, each switch X periodically sends (X, 0, X) from all its ports Root ID rule: Root ID r at switch X is the minimum of X and root IDs received at all ports Switch 4 sends (4, 0, 4); switch ignores 4 Root id: 1 6

37 STP: Startup and calcula0ng the root Note: Ini7ally, each switch X periodically sends (X, 0, X) from all its ports Root ID rule: Root ID r at switch X is the minimum of X and root IDs received at all ports 4 Root id: Switch Not yet 4 sends agreeing (4, 0, 4); on switch the iden0ty of the root: Root let s id: now 1 see ignores how switches propagate informa0on through the network 1 7

38 Simplified STP: State at each switch Each switch X keeps the following state: 1. Its view of who the root is Ini7ally, itself: X. Its configura0on message to send Ini7ally, announcing itself as root with zero distance to root: (X, 0, X) X Root id: X Msg: (X, 0, X) 8

39 Simplified STP: Calcula0ng the message Switch X finds its distance from the root (d): 1. If X thinks it is the root, d # 0. Otherwise, d # the minimum distance from messages received matching X s root id (call it r), plus one Configura0on message rule: Switch X sets its configura7on message to (r, d, X). If configura7on message changes, sends updated message immediately Root id: Msg: (, 0, ) 4 Root id: 4 Msg: (4, 0, 4) Root id: Msg: (, 0, ) 1 Msg: (1, 0, 1) 9

40 Simplified STP: Calcula0ng the message Switch X finds its distance from the root (d): 1. If X thinks it is the root, d # 0. Otherwise, d # the minimum distance from messages received matching X s root id (call it r), plus one Configura0on message rule: Switch X sets its configura7on message to (r, d, X). If configura7on message changes, sends updated message immediately Switch 1 sends (1, 0, 1), switches and update their root ids and msgs Msg: (1, 1, ) 1 Msg: (1, 0, 1) 4 Root id: Msg: (4, 0, 4) Msg: (1, 1, ) 40

41 Simplified STP: Calcula0ng the message Switch X finds its distance from the root (d): 1. If X thinks it is the root, d # 0. Otherwise, d # the minimum distance from messages received matching X s root id (call it r), plus one Configura0on message rule: Switch X sets its configura7on message to (r, d, X). If configura7on message changes, sends updated message immediately Switch sends (1, 1, ), switch 4 updates its root id and message Msg: (1, 1, ) 1 Msg: (1, 0, 1) 4 Msg: (1,, 4) Msg: (1, 1, ) 41

42 Simplified STP: Calcula0ng the message Switch X finds its distance from the root (d): 1. If X thinks it is the root, d # 0. Otherwise, d # the minimum distance from messages received matching X s root id (call it r), plus one 4 Msg: (1,, 4) Configura0on message rule: Now Switch all X switches sets its configura7on agree the root iden0fier. Root But id: 1 how do they message decide to (r, which d, X) ports to block to form the Msg: spanning (1, 1, ) tree? Msg: (1, 1, ) 1 Msg: (1, 0, 1) 4

43 STP: Port status All switches connected to a Ethernet LAN (or the two at the ends of a cable) agree on a single designated port 4 Msg: (1,, 4) Designated port: The port on the shortest path from the LAN or cable to the root is the designated port (D) D Msg: (1, 1, ) D The designated port forwards frames from the LAN to the root Only designated ports send configura7on messages D 1 Msg: (1, 0, 1) Msg: (1, 1, ) D 4

44 STP: Port status Root port: Each non- root switch notes which of its ports is on the shortest path to the root; this port is the root port (R) R D D R Msg: (1, 1, ) 1 Msg: (1, 0, 1) 4 Msg: (1,, 4) Msg: (1, 1, ) D D R 44

45 STP: Port status Blocked port: If neither designated nor root, a port is a blocked port (B), not forwarding data traffic. R 4 Msg: (1,, 4) R D D Msg: (1, 1, ) B 1 Msg: (1, 0, 1) B Msg: (1, 1, ) D D R 45

46 STP: State at each switch Each switch X keeps the following state: 1. Its view of who the root is Ini7ally, itself: X. Its configura0on message to send Ini7ally, announcing itself as root with zero distance to root: (X, 0, X) X Root id: X Msg: (X, 0, X) D: (X, 0, X). For each of X s ports: Whether designated (D), root (R), or blocking (B) data traffic Ini7ally, designated (D) Best configura7on message heard on that port Ini7ally, its own configura7on message (X, 0, X) 46

47 STP: Designated port rule At a switch, for each port p: Consider all configura7on messages received on port p and the configura7on message the switch would send If switch receives a bener configura7on message on a port p, don t send configura0on messages on port p Else, p is designated: send configura0on message on p Rule for comparing configura7on messages: (R 1, d 1, X 1 ) beger than (R, d, X ) if R 1 < R or (R 1 = R and d 1 < d ) or (R 1 = R and d 1 = d and X 1 < X ) 47

48 STP: Complete example All switches begin thinking they are root with all ports in the designated state D: (4,0,4) 4 Root id: 4 Msg: (4,0,4) D: (,0,) D: (,0,) Root id: Msg: (,0,) D: (,0,) D: (,0,) D: (,0,) Root id: Msg: (,0,) D: (,0,) D: (1,0,1) 1 Msg: (1,0,1) D: (1,0,1) 48

49 STP: Complete example All switches begin thinking they are root with all ports in the designated state D: (4,0,4) 4 Root id: 4 Msg: (4,0,4) Switch 1 sends (1,0,1), switches and update their root ids, ports, and msgs Switch breaks 7e between the two copies of (1,0,1) locally by numbering its ports Each switch s port remembers the best configura7on message seen so far R: (1,0,1) # (1, 0, 1) D: (1,0,1) D: (,0,) Msg: (1,1,) B: (1,0,1) 1 Msg: (1,0,1) D: (,0,) D: (,0,) Msg: (1,1,) 1 R: (1,0,1) D: (1,0,1) (1, 0, 1) " 49

50 STP: Complete example R: (1,0,1) (1,1,) " R: (1,1,) D: (,0,) Msg: (1,1,) B: (1,0,1) 1 4 Msg: (1,,4) D: (,0,) D: (1,1,) Msg: (1,1,) 1 R: (1,0,1) D: (1,0,1) D: (1,0,1) 1 Msg: (1,0,1) 50

51 STP: Complete example Switch sends (1,1,) from its designated ports, switch 4 updates its root id and message Switch, port remains designated because Switch s message (1,1,) is bener than (1,1,) Switch 1, port 1 remains designated because Switch 1 s message (1,0,1) is bener than (1,1,) R: (1,0,1) (1,1,) " R: (1,1,) D: (,0,) Msg: (1,1,) B: (1,0,1) 1 4 Msg: (1,,4) D: (,0,) D: (1,1,) Msg: (1,1,) 1 R: (1,0,1) D: (1,0,1) D: (1,0,1) 1 Msg: (1,0,1) 51

52 STP: Complete example Switch sends (1,1,) from port only Switch blocks its port since (1,1,) is bener than its message (1,1,) 1 R: (1,0,1) R: (1,1,) D: (,0,) Msg: (1,1,) B: (1,0,1) 4 Msg: (1,,4) B: (1,1,) D: (1,1,) Msg: (1,1,) 1 R: (1,0,1) D: (1,0,1) 1 Msg: (1,0,1) D: (1,0,1) 5

53 STP: Dynamics When do switches send configura<on messages? If you think you re the root, send periodically with parameter hello <me (two seconds recommended in 80.1d) Other switches send on all designated ports upon receiving root s message How does the algorithm adapt to topology changes? State table contains age field, which is updated con7nuously Aging rule: If age reaches a threshold max age (0 sec in 80.1d), discard that table entry and recalculate using all rules What happens if max age is too big? Too small? Recalculate when receive bener or newer configura7on message on port p (resul7ng in a table entry being overwrinen) 5

54 STP: Handling failures Suppose the Ethernet LAN fails R: (1,1,) 4 Msg: (1,,4) 1 R: (1,0,1) D: (,0,) Msg: (1,1,) B: (1,0,1) B: (1,1,) D: (1,1,) Msg: (1,1,) 1 R: (1,0,1) D: (1,0,1) 1 Msg: (1,0,1) D: (1,0,1) 54

55 STP: Handling failures Suppose the Ethernet LAN fails Switch : Stops hearing the root s messages through port 1, so it becomes designated Port becomes root Updates its own message 1 D: (1,,) R: (1,1,) D: (,0,) Msg: (1,,) B: (1,0,1) 4 Msg: (1,,4) R: (1,1,) D: (1,1,) Msg: (1,1,) 1 R: (1,0,1) D: (1,0,1) 1 Msg: (1,0,1) D: (1,0,1) 55

56 STP: Handling failures Suppose the Ethernet LAN fails Switch 4: Updates message heard on root port Updates its own message Switch : Stops hearing the root s messages through port, so it becomes designated 1 D: (1,,) R: (1,,) D: (,0,) Msg: (1,,) D: (1,1,) 4 Msg: (1,,4) R: (1,1,) D: (1,1,) Msg: (1,1,) 1 R: (1,0,1) D: (1,0,1) 1 Msg: (1,0,1) D: (1,0,1) 56

57 STP: Handling topology change Suppose we fix the LAN. Now we have created (temporary) forwarding loops R: (1,,) 4 Msg: (1,,4) This also happens when switches are powered- up 1 D: (1,,) D: (,0,) Msg: (1,,) D: (1,1,) R: (1,1,) D: (1,1,) Msg: (1,1,) 1 R: (1,0,1) D: (1,0,1) 1 Msg: (1,0,1) D: (1,0,1) 57

58 STP: Pre- forwarding port state Suppose any of the following apply to a port: 1. Transi7on from B à D. Any newly- connected port (detect Ethernet carrier). Any port on a freshly- powered switch The port then enters the pre- forwarding (PF) state, where: It sends configura7on messages and transi7ons to blocked and root states as if designated 1 PF: (1,,) R: (1,,) D: (,0,) Msg: (1,,) PF: (1,1,) 4 Msg: (1,,4) R: (1,1,) D: (1,1,) Msg: (1,1,) 1 R: (1,0,1) But it does not forward data frames, so can t create loops PF: (1,0,1) 1 Msg: (1,0,1) D: (1,0,1) 58

59 STP: Pre- forwarding port state Switches returns to old state R: (1,,) 4 Msg: (1,,4) 1 R: (1,0,1) D: (,0,) Msg: (1,1,) PF: (1,1,) R: (1,1,) D: (1,1,) Msg: (1,1,) 1 R: (1,0,1) PF: (1,0,1) 1 Msg: (1,0,1) D: (1,0,1) 59

60 STP: Pre- forwarding port state Switch returns to old state Switch returns to old state R: (1,,) 4 Msg: (1,,4) 1 R: (1,0,1) D: (,0,) Msg: (1,1,) B: (1,0,1) R: (1,1,) D: (1,1,) Msg: (1,1,) 1 R: (1,0,1) PF: (1,0,1) 1 Msg: (1,0,1) D: (1,0,1) 60

61 STP: Pre- forwarding port state Switch returns to old state Switch returns to old state Switch 4 returns to old state R: (1,1,) 4 Msg: (1,,4) Now switch 1, port 1 remains in the pre- forwarding state 1 R: (1,0,1) D: (,0,) Msg: (1,1,) B: (1,0,1) R: (1,1,) D: (1,1,) Msg: (1,1,) 1 R: (1,0,1) 1 1 PF: (1,0,1) D: (1,0,1) Msg: (1,0,1) 61

62 STP: Leaving the pre- forwarding state If s7ll in PF state ayer some number of seconds (forwarding delay parameter) then the port becomes designated (D) How long should forwarding delay be? Long enough for the en7re spanning tree to re- form, i.e.: Twice the maximum transit 7me across the extended LAN 0 seconds in 80.1d 1 R: (1,0,1) R: (1,1,) D: (,0,) Msg: (1,1,) B: (1,0,1) 4 Msg: (1,,4) B: (1,1,) D: (1,1,) Msg: (1,1,) 1 R: (1,0,1) 1 1 D: (1,0,1) D: (1,0,1) Msg: (1,0,1) 6

63 The evolu0on of Ethernet From the coaxial cable shared medium to switches Even more capacity, with simultaneous conversa7ons From Mbit/s experimental Ethernet to 100 Gbit/s recent standards From electrical signaling to op7cal Changed everything except the frame format Lesson: The right interface can accommodate many changes Implementa7on is hidden behind interface 6

64 Today We finish the func7onality of the link layer, and 7e it in to IP 1. Addressing. Repeaters, hubs, and switches. Bootstrapping a host Protocols for bootstrapping: DHCP, ARP Communica7ng over the same, different networks 64

65 What does a host need to know???? host host... DNS host host... DNS 1...0/ /

66 What does a host need to know? What IP address should the host use? What local DNS server to use? How to tell which des7na7ons are local? How to address them using the local network? How to send packets to remote des7na7ons???? host host... DNS host host... DNS 1...0/ /

67 Avoiding manual configura0on host host... DNS 1A- F- BB AD host host... DNS 1...0/ /4 67

68 Avoiding manual configura0on Dynamic Host Configura7on Protocol (DHCP) End host learns how to send packets Learn IP address, DNS servers, gateway, what s local Address Resolu7on Protocol (ARP) For local des7na7ons, learn the mapping between IP address and MAC address host host... DNS 1A- F- BB AD host host... DNS 1...0/ /4 68

69 Avoiding manual configura0on Dynamic Host Configura7on Protocol (DHCP) End host learns how to send packets Learn IP address, DNS servers, gateway, what s local Address Resolu7on Protocol (ARP) For local des7na7ons, learn the mapping between IP address and MAC address host host... DNS 1A- F- BB AD host host... DNS 1...0/ /4 69

70 Avoiding manual configura0on Dynamic Host Configura7on Protocol (DHCP) End host learns how to send packets Learn IP address, DNS servers, gateway, what s local Address Resolu7on Protocol (ARP) For local des7na7ons, learn the mapping between IP address and MAC address host host... DNS 1A- F- BB AD host host... DNS 1...0/ /4 70

71 Avoiding manual configura0on Dynamic Host Configura7on Protocol (DHCP) End host learns how to send packets Learn IP address, DNS servers, gateway, what s local Address Resolu7on Protocol (ARP) For local des7na7ons, learn the mapping between IP address and MAC address host host... DNS 1A- F- BB AD host host... DNS 1...0/ /4 71

72 Avoiding manual configura0on Dynamic Host Configura7on Protocol (DHCP) End host learns how to send packets Learn IP address, DNS servers, gateway, what s local Address Resolu7on Protocol (ARP) For local des7na7ons, learn the mapping between IP address and MAC address host host... DNS 1A- F- BB AD host host... DNS 1...0/ /4 7

73 Avoiding manual configura0on Dynamic Host Configura7on Protocol (DHCP) End host learns how to send packets Learn IP address, DNS servers, gateway, what s local Address Resolu7on Protocol (ARP) For local des7na7ons, learn the mapping between IP address and MAC address host host... DNS 1A- F- BB AD host host... DNS 1...0/ /4 7

74 Key ideas in both protocols Broadcas0ng: when in doubt, shout! Broadcast query to all hosts in the local- area- network when you don t know how to iden7fy the right one Caching: remember the past for a while Store the informa7on you learn to reduce overhead Remember your own address and other host s addresses SoX state: eventually forget the past Associate a ;me- to- live field with the informa7on On expiry either refresh or discard the informa7on This is key for robustness in the face of unpredictable change 74

75 Bootstrapping problem Host doesn t have an IP address yet So, host doesn t know what source address to use Host doesn t know whom to ask for an IP address So, host doesn t know what des0na0on address to use host host 75

76 DHCP discovery, from the client DHCP Solu0on: shout to discover a server that can help Client broadcasts a DHCP discover message (to the broadcast IP address, ) Two possibili7es: 1. Server on same subnet sends a reply offering an address. Or: a DHCP relay agent (configured only with DHCP server s IP address) unicasts to a DHCP server on another network DHCP server replies unicast to relay agent; agent forwards replies to the new host s network host host DHCP server DHCP server DHCP relay 76

77 Response from the DHCP server The server responds with a DHCP offer message Contains configura7on parameters (including proposed IP address, mask, gateway, DNS server) Contains lease ;me (dura7on the informa7on remains valid) Mul7ple servers may respond Mul7ple servers on the same subnetwork Each may respond with an offer Accep7ng one of the offers Client sends a DHCP request echoing the parameters The DHCP server responds with a DHCP ACK to confirm The other servers see they were not chosen They can then safely offer those same parameters to other clients 77

78 Dynamic Host Configura0on Protocol Arriving client DHCP discover (broadcast) DHCP offer (broadcast) DHCP ACK (broadcast) DHCP request (broadcast) DHCP server Why all the broadcasts? Discover broadcast: client doesn t know DHCP server s iden7ty Offer, ACK broadcast: client doesn t have an IP yet Request broadcast: so other servers can see 78

79 SoX state: Refresh or forget Why is a lease 7me necessary? Client can release the IP address (DHCP release) e.g., clean shutdown of the computer But, host might not release the address e.g., the host crashes e.g., buggy client soyware And you don t want the address to be allocated forever Performance trade- offs Short lease 7me: returns inac7ve addresses quickly Long lease 7me: avoids overhead of frequent renewals & lessens frequency of lease being denied 79

80 So, now the host knows things! IP address! Mask! Gateway! DNS server And can send packets to other IP addresses But: how to use the local network to do this? 80

81 Figuring out where to send locally Two cases: 1. Des7na7on is on the local network: need to address it directly. Des7na7on is not local (remote): need to figure out the first hop on the local network Determining if it s local: use the netmask e.g., bitwise- AND the des7na7on IP address with Is it the same value as when we do the same with own IP address? Yes " des7na7on IP is local; no " des7na7on IP is remote 81

82 Figuring out where to send locally Two cases: 1. Des7na7on is on the local network: need to address it directly. Des7na7on is not local (remote): need to figure out the first hop on the local network Determining if it s local: use the netmask e.g., bitwise- AND the des7na7on IP address with Is it the same value as when we do the same with own IP address? Yes " des7na7on IP is local; no " des7na7on IP is remote host host... DNS 1A- F- BB AD host host... DNS 1...0/ /4 8

83 Figuring out where to send locally Two cases: 1. Des7na7on is on the local network: need to address it directly. Des7na7on is not local (remote): need to figure out the first hop on the local network Determining if it s local: use the netmask e.g., bitwise- AND the des7na7on IP address with Is it the same value as when we do the same with own IP address? Yes " des7na7on IP is local; no " des7na7on IP is remote host host... DNS 1A- F- BB AD host host... DNS 1...0/ /4 8

84 Figuring out where to send locally () If it s remote, look up the first hop in a (very small) local rou7ng table e.g., by default, route via Now do the local case but for rather than ul7mate des7na7on IP address host host... DNS 1A- F- BB AD host host... DNS 1...0/ /4 For the local case, need to determine the des7na7on s link- layer address How does a host translate the next hop IP address to a link- layer address? 84

85 Address Resolu0on Protocol (ARP) Every node maintains an ARP table (IP address, link- layer address) pairs Consult the table when sending a packet Map des7na7on IP address to des7na7on MAC address Encapsulate and transmit the data packet But: what if IP address not in the table? Sender broadcasts: Who has IP address ? Receiver responds (unicast, to the source of the broadcast): link- layer address D7- FA- 0- B0 Sender caches result in its ARP table Sender may include its own <IP, link- layer> address mapping in request, so that receiver can reply back to the sender 85

86 Example: Pukng it all together How does host A send a datagram to host B? 1. A sends packet to R. R sends packet to B A host 74:9:9c:e8:ff: netmask 0xfffff000 49:bd:d:C7:56:a B host Network /0 e6:e9:00:17:bb:4b R 1a::f9:cd:06:9b Network /0 86

87 Host A decides to send through R Host A constructs an IP packet to send to B IP source , IP des7na7on Host A has a gateway R Used to reach any des7na7on outside of /0 Address for R learned via DHCP A host 74:9:9c:e8:ff: netmask 0xfffff000 49:bd:d:C7:56:a B host Network /0 e6:e9:00:17:bb:4b R 1a::f9:cd:06:9b Network /0 87

88 Host A sends packet through R Host A learns the MAC address of R s interface ARP request: broadcast request for ARP response: R responds with e6:e9:00:17:bb:4b Host A encapsulates the packet in a link- layer header and sends to R A host 74:9:9c:e8:ff: netmask 0xfffff000 49:bd:d:C7:56:a B host Network /0 To: R A " B data e6:e9:00:17:bb:4b R 1a::f9:cd:06:9b Network /0 88

89 R decides how to forward datagram Router R s ley interface receives the packet R extracts the IP packet from the Ethernet frame R sees the IP packet is des7ned to Router R consults its forwarding table Packet matches /0 via right interface A host 74:9:9c:e8:ff: netmask 0xfffff000 49:bd:d:C7:56:a B host Network /0 e6:e9:00:17:bb:4b A " B data R 1a::f9:cd:06:9b Network /0 89

90 R sends datagram to B Router R s right interface learns the link- layer address of host B ARP request: broadcast request for ARP response: B responds with 49:bd:d:C7:56:a Router R encapsulates the packet and sends to B A host 74:9:9c:e8:ff: netmask 0xfffff000 49:bd:d:C7:56:a B host Network /0 e6:e9:00:17:bb:4b R To: B A " B data 1a::f9:cd:06:9b Network /0 90

91 Security analysis of ARP Impersona0on Any node that hears an ARP request can answer and can say whatever they want Actual legit receiver never sees a problem Because even though later packets carry its IP address, its NIC doesn t capture them since not its link- layer address Man- in- the- middle alack Imposter updates frames with correct link- layer address and forwards whatever it receives to the legit des7na7on but gets to inspect (and maybe alter) it first Does the anacker have to win a race? Maybe not, if sender blindly believes ARP responses 91

92 Drawbacks of extended LANs Switched LANs afford greater scalability, but extended LANs do not isolate traffic Three resul7ng drawbacks: 1. Security: Allows eavesdropping across LANs, just by puvng an interface in promiscuous mode. Load: Some LANs are more heavily- used than others, may be desirable to separate them at 7mes.. Broadcast scalability: Broadcast frames traverse the en7re extended LAN; this reduces overall performance 9

Addressing and Switching in the Link Layer

Addressing and Switching in the Link Layer Addressing and Switching in the Link Layer Stefano Vissicchio UCL Computer Science COMP00 Recap: We have done a full pass on the stack email WWW phone...! SMTP HTTP RTP...! TCP UDP!! IP! When and how to

More information

Lecture 11: Addressing, Framing, and Switching in the Link Layer CS 3035/GZ01: Networked Systems Kyle Jamieson

Lecture 11: Addressing, Framing, and Switching in the Link Layer CS 3035/GZ01: Networked Systems Kyle Jamieson Lecture 11: Addressing, Framing, and Switching in the Link Layer CS 05/GZ01: Networked Systems Kyle Jamieson Department of Computer Science University College London The link layer: FuncFonality IP datagram

More information

Missing pieces + Putting the pieces together

Missing pieces + Putting the pieces together Missing pieces + Putting the pieces together CS 168, Fall 2014 Sylvia Ratnasamy Material thanks to Ion Stoica, Scott Shenker, Jennifer Rexford, Nick McKeown, and many other colleagues Today Switched Ethernet

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any

More information

CS 457 Lecture 11 More IP Networking. Fall 2011

CS 457 Lecture 11 More IP Networking. Fall 2011 CS 457 Lecture 11 More IP Networking Fall 2011 IP datagram format IP protocol version number header length (bytes) type of data max number remaining hops (decremented at each router) upper layer protocol

More information

Ethernet. EE 122: Intro to Communication Networks. Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz

Ethernet. EE 122: Intro to Communication Networks. Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz Ethernet EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks

More information

Link layer: introduction

Link layer: introduction Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,

More information

Missing pieces + Putting the pieces together

Missing pieces + Putting the pieces together Missing pieces + Putting the pieces together EE 122, Fall 2013 Sylvia Ratnasamy http://inst.eecs.berkeley.edu/~ee122/ Material thanks to Ion Stoica, Scott Shenker, Jennifer Rexford, Nick McKeown, and many

More information

Transla'ng Addresses. Goals of Today s Lecture

Transla'ng Addresses. Goals of Today s Lecture Transla'ng ddresses 1 Goals of Today s Lecture Three different kinds of addresses Host names (e.g., www.cnn.com) IP addresses (e.g., 64.236.16.20) MC addresses (e.g., 00-15- C5-49- 04-9) Protocols for

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Goals of Today s Lecture. Transla'ng Addresses. Separa'ng Names and IP Addresses. Separa'ng IP and MAC Addresses

Goals of Today s Lecture. Transla'ng Addresses. Separa'ng Names and IP Addresses. Separa'ng IP and MAC Addresses Goals of Today s Lecture Transla'ng ddresses Three different kinds of addresses Host names (e.g., www.cnn.com) IP addresses (e.g., 64.236.16.20) MC addresses (e.g., 00-15- C5-49- 04-9) Protocols for transla'ng

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Principles behind data link layer services:

Principles behind data link layer services: Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

More information

Switching and bridging

Switching and bridging Switching and bridging CSCI 466: Networks Keith Vertanen Fall 2011 Last chapter: Overview Crea7ng networks from: Point- to- point links Shared medium (wireless) This chapter: SoCware and hardware connec7ng

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) March 19 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks Reliable

More information

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017 CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

L2 Addressing and data plane. Benjamin Baron

L2 Addressing and data plane. Benjamin Baron L2 Addressing and data plane Benjamin Baron benjamin.baron@lip6.fr Goals of Today s Lecture Devices that shuttling packets at different layers - Repeaters and hubs - Bridges and switches - Routers Switch

More information

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1 Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Link Layer. w/ credit to Rick Graziani (Cabrillo) for some of the anima<ons

Link Layer. w/ credit to Rick Graziani (Cabrillo) for some of the anima<ons Link Layer w/ credit to Rick Graziani (Cabrillo) for some of the anima

More information

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose CSEN 503 Introduction to Communication Networks Mervat AbuElkheir Hana Medhat Ayman Dayf **Slides are attributed to J. F. Kurose 1-2 Link Layer Link Layer: Introduction Some terminology: hosts and routers

More information

EPL606. Internetworking. Part 2a. 1Network Layer

EPL606. Internetworking. Part 2a. 1Network Layer EPL606 Internetworking Part 2a The majority of the slides in this course are adapted from the accompanying slides to the books by Larry Peterson and Bruce Davie and by Jim Kurose and Keith Ross. Additional

More information

Professor Yashar Ganjali Department of Computer Science University of Toronto.

Professor Yashar Ganjali Department of Computer Science University of Toronto. Professor Yashar Ganjali Department of Computer Science University of Toronto yganjali@cs.toronto.edu http://www.cs.toronto.edu/~yganjali Announcements Problem Set 1 is posted on class web page. Problems

More information

LAN Interconnection and Other Link Layer Protocols

LAN Interconnection and Other Link Layer Protocols LAN Interconnection and Other Link Layer Protocols Ethernet dominant link layer technology for local-area networks Ethernet frame structure Kai Shen Dept. of Computer Science, University of Rochester Ethernet

More information

Principles behind data link layer services:

Principles behind data link layer services: Data Link Layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2017 A-term 1 Some slides are originally from the course materials of the textbook

More information

Link Layer. w/ much credit to Cisco CCNA and Rick Graziani (Cabrillo)

Link Layer. w/ much credit to Cisco CCNA and Rick Graziani (Cabrillo) Link Layer w/ much credit to Cisco CCNA and Rick Graziani (Cabrillo) Administra>via How are the labs going? Telnet- ing into Linux as root In /etc/pam.d/remote comment out line auth required pam_securely.so

More information

CSC 4900 Computer Networks: Link Layer (2)

CSC 4900 Computer Networks: Link Layer (2) CSC 4900 Computer Networks: Link Layer (2) Professor Henry Carter Fall 2017 Link Layer 6.1 Introduction and services 6.2 Error detection and correction 6.3 Multiple access protocols 6.4 LANs addressing,

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21! CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also

More information

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, Chapters 4.3.4

More information

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 9 The Data Link Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Physical Addresses Physical (or LAN or MAC) address: 48 bit string Hexadecimal representation

More information

CS 455/555 Intro to Networks and Communications. Link Layer Addressing, Ethernet, and a Day in the Life of a Web Request

CS 455/555 Intro to Networks and Communications. Link Layer Addressing, Ethernet, and a Day in the Life of a Web Request CS 455/555 Intro to Networks and Communications Link Layer Addressing, ernet, and a Day in the Life of a Web Request Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu

More information

Some portions courtesy Srini Seshan or David Wetherall

Some portions courtesy Srini Seshan or David Wetherall CSE 123 Computer Networks Fall 2009 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Misc Homework solutions have been posted I ll post a sample

More information

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

Hubs. twisted pair. hub. 5: DataLink Layer 5-1 Hubs Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSMA/CD at : adapters detect collisions provides net management

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.2: IP Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

More information

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Communication Networks ( ) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner Communication Networks (0368-3030) / Fall 2013 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapter 4 (5 th ed.) Many slides adapted from: J. Kurose & K. Ross

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

Basic elements of IP and its interac2on with Ethernet

Basic elements of IP and its interac2on with Ethernet Basic elements of IP and its interac2on with Ethernet IP addressing, Forwarding, ARP, ARP poisoning Marco Bonola, Lorenzo Bracciale Corso di Fondamen2 di Re2 e Segnali Prof. Giuseppe Bianchi A.A. 2010

More information

Lecture 9: Bridging & Switching"

Lecture 9: Bridging & Switching Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Stefano Vissicchio UCL Computer Science COMP0023 Internetworking Goal: Connect many networks together into one Internet. Any computer can send to any other computer on any

More information

Switching & ARP Week 3

Switching & ARP Week 3 Switching & ARP Week 3 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 Many Slides courtesy of Tony Chen 1 Ethernet Using Switches In the last few years, switches have quickly

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Last Time How do multiple hosts share a single channel?

More information

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 7: Switching technologies Chapter 3.1 Xiaowei Yang xwy@cs.duke.edu Types of switching Datagram Virtual circuit Source routing Today Bridges and LAN switches

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 2. Direct Link Networks Link Service and Framing Error Detection and Reliable Transmission HDLC, PPP, and SONET Token Ring Ethernet Bridges and

More information

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging) Administrivia CSC458 Lecture 4 Bridging LANs and IP Homework: # 1 due today # 2 out today and due in two weeks Readings: Chapters 3 and 4 Project: # 2 due next week Tutorial today: Joe Lim on project 2

More information

CSCD 330 Network Programming Spring 2017

CSCD 330 Network Programming Spring 2017 CSCD 330 Network Programming Spring 2017 Lecture 18 Link Layer Protocols Continued Who is this? Reading: Chapter 5 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright

More information

Network Administra0on

Network Administra0on Network Administra0on (Introduc0on) Administración en Red 1 Index Introduc0on (TCP/IP) Network Interface Link Layer Network Layer Monitoring/Test Administración en Red 2 Introduc0on (TCP/IP) Protocol Suite,

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)

More information

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2.

CS 356: Computer Network Architectures. Lecture 14: Switching hardware, IP auxiliary functions, and midterm review. [PD] chapter 3.4.1, 3.2. CS 356: Computer Network Architectures Lecture 14: Switching hardware, IP auxiliary functions, and midterm review [PD] chapter 3.4.1, 3.2.7 Xiaowei Yang xwy@cs.duke.edu Switching hardware Software switch

More information

The Link Layer and LANs: Ethernet and Swiches

The Link Layer and LANs: Ethernet and Swiches The Link Layer and LNs: Ethernet and Swiches EECS3214 2018-03-21 Link layer, LNs: outline 6.1 introduction, services 6.2 error detection, correction 6.3 multiple access protocols 6.4 LNs addressing, RP

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer

More information

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted

More information

Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises

Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises Full paper available at http://www.cs.princeton.edu/~chkim Changhoon Kim, Matthew Caesar, and Jennifer Rexford Outline of Today

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges.

Introduction to Communication Networks Spring Unit 13 Network extensions Bridges. Introduction to Communication Networks Spring 2007 Unit 13 Network extensions Bridges. Acknowledgements slides coming from: The book by Peterson/Davie The book by Wiliam Stallings Slides from lectures

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

More on Link Layer. Recap of Last Class. Interconnecting Nodes in LAN (Local-Area Network) Interconnecting with Hubs. Computer Networks 9/21/2009

More on Link Layer. Recap of Last Class. Interconnecting Nodes in LAN (Local-Area Network) Interconnecting with Hubs. Computer Networks 9/21/2009 More on Link Layer Kai Shen Recap of Last Class Ethernet dominant link layer technology for local-area l networks Ethernet frame structure Ethernet multiple access control CSMA/CD, exponential back-off

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.1: Internetworking Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer, Switches, VLANS, MPLS, Data Centers Sec 6.4 to 6.7 Prof. Lina Battestilli Fall 2017 Chapter 6 Outline Link layer and LANs: 6.1 introduction,

More information

Network Model. Why a Layered Model? All People Seem To Need Data Processing

Network Model. Why a Layered Model? All People Seem To Need Data Processing Network Model Why a Layered Model? All People Seem To Need Data Processing Layers with Functions Packet Propagation Each router provides its services to support upper-layer functions. Headers (Encapsulation

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Subnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction

Subnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction The Network layer Host, network layer functions: Network layer Routing protocols path selection R, OSPF, BGP Transport layer: TCP, forwarding table Link layer physical layer protocol addressing conventions

More information

Telematics I. Chapter 6 Internetworking. (Acknowledement: These slides have been compiled from H. Karl s set of slides)

Telematics I. Chapter 6 Internetworking. (Acknowledement: These slides have been compiled from H. Karl s set of slides) Telematics I Chapter 6 Internetworking (Acknowledement: These slides have been compiled from H. Karl s set of slides) 1 Goals of This Chapter So far: we can communicate between nodes all connected directly

More information

Packet Switching. Guevara Noubir Fundamentals of Computer Networks. Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann

Packet Switching. Guevara Noubir Fundamentals of Computer Networks. Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Guevara Noubir Textbook: Chapter 3. Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann Outline Store- and- Forward Switches Cell Switching Segmenta?on and Reassembly Bridges

More information

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L6 Networking and IP

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L6 Networking and IP EITF25 Internet- - Techniques and Applica8ons Stefan Höst L6 Networking and IP Data communica8on In reality, the source and des8na8on hosts are very seldom on the same network, for example web surf. Internet

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized

More information

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R PUCPR Internet Protocol Address Resolution and Routing Edgard Jamhour 2014 E N G L I S H S E M E S T E R 1. Address Resolution The IP address does not identify, indeed, a computer, but a network interface.

More information

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018 CS 43: Computer Networks 21: The Network Layer & IP November 7, 2018 The Network Layer! Application: the application (e.g., the Web, Email) Transport: end-to-end connections, reliability Network: routing

More information

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks.

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks. Computer Networks Prof: Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 21 Local Internetworking Good day. Today we will be talking about

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

1 Connectionless Routing

1 Connectionless Routing UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing

More information

Full file at

Full file at Guide to Networking Essentials, Sixth Edition 2-1 Chapter 2 Network Hardware Essentials At a Glance Instructor s Manual Table of Contents Overview Objectives Tips Quick Quizzes Class Discussion Topics

More information

ICS 451: Today's plan

ICS 451: Today's plan ICS 451: Today's plan ICMP ping traceroute ARP DHCP summary of IP processing ICMP Internet Control Message Protocol, 2 functions: error reporting (never sent in response to ICMP error packets) network

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

7010INT Data Communications Lecture 7 The Network Layer

7010INT Data Communications Lecture 7 The Network Layer Introduction 7010INT Data Communications Lecture 7 The Layer Internetworking & Devices Connecting LANs Routing Backbone networks Virtual LANs Addressing Application Presentation Session Data Link Physical

More information

Introduction to Internetworking

Introduction to Internetworking Introduction to Internetworking Introductory terms Communications Network Facility that provides data transfer services An internet Collection of communications networks interconnected by bridges and/or

More information

IP/MAC Address Translation

IP/MAC Address Translation IP/MAC Address Translation -Go over quiz answers -ARP -DHCP -NAT Today Transition from Network to Datalink How do we get datagrams to the right physical host? Tricky part comes when a router is forwarding

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introduction (forwarding and routing) Review of queueing theory Routing algorithms Link state, Distance Vector Router design and operation IP: Internet Protocol IPv4 (datagram format, addressing,

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

Lecture 20: Link Layer

Lecture 20: Link Layer Lecture 20: Link Layer COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F Kurose and K.W. Ross, All Rights

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.13 Chapter 4: outline 4.1 introduction 4.2 virtual circuit and datagram

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information