Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Similar documents
Lecture 9: Bridging & Switching"

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

CSE 461: Multiple Access Networks. This Lecture

CSE/EE 461 Wireless and Contention-Free Protocols

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

CSE/EE 461 Section 2

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Multiple Access Protocols

Reminder: Datalink Functions Computer Networking. Datalink Architectures

EE 122: Ethernet and

Summary of MAC protocols

CSE 461 Multiple Access. David Wetherall

Medium Access Protocols

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

ECE 4450:427/527 - Computer Networks Spring 2017

Local Area Networks (LANs) SMU CSE 5344 /

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Data Link Layer, Part 5. Medium Access Control

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Some portions courtesy Srini Seshan or David Wetherall

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and Ethernet

Link Layer and Ethernet

Data Link Layer, Part 3 Medium Access Control. Preface

Principles behind data link layer services

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Chapter 5 Link Layer and LANs

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

CARRIER SENSE MULTIPLE ACCESS (CSMA):

The Link Layer and LANs. Chapter 6: Link layer and LANs

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

Multiple Access Links and Protocols

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Chapter 6 Medium Access Control Protocols and Local Area Networks

CSE 123A Computer Networks

Contention Protocols and Networks

Housekeeping. Fall /5 CptS/EE 555 1

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Redes de Computadores. Medium Access Control

Chapter 8 LAN Topologies

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Networking Technologies and Applications

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CMPE 257: Wireless and Mobile Networking

CS 455/555 Intro to Networks and Communications. Link Layer

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Chapter 12 Multiple Access 12.1

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon

LAN PROTOCOLS. Beulah A AP/CSE

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Chapter 5 Link Layer and LANs

Aloha and slotted aloha

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Principles behind data link layer services:

Part3. Local Area Networks (LAN)

Principles behind data link layer services:

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

COS 140: Foundations of Computer Science

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Master Course Computer Networks IN2097

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Data Link Layer: Multi Access Protocols

Medium Access Control Sublayer Chapter 4

CSC 4900 Computer Networks: The Link Layer

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Introduction to Networks and the Internet

Ethernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain

Lecture 4b. Local Area Networks and Bridges

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Data Link Layer: Overview, operations

Link Layer: Retransmissions

Links. CS125 - mylinks 1 1/22/14

Computer Networks Principles LAN - Ethernet

Chapter 5: DataLink Layer

Medium Access Control

!! Due next week (week 3), start of class. !! Electronic turnin. !! No class trawler (do that for Fishnet #2) !! On web site

Medium Access Control

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

EECS 122, Lecture 7. Kevin Fall Jean Walrand

Direct Link Communication II: Wired Media. Multi-Access Communication

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Multiple Access Channels

Access Technologies! Fabio Martignon

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Chapter V: Link Layer

COMP/ELEC 429/556 Introduction to Computer Networks

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Transcription:

Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren

Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also frequently on number of hosts connected Methods to interconnect LANs Repeaters and bridges Switching 2

Jamming Even with CSMA there can still be collisions. Why? If nodes can detect collisions, abort! (CSMA/CD) Requires a minimum frame size ( acquiring the medium ) B must continue sending ( jam ) until A detects collision Requires a full duplex channel A Time for B to detect A s transmission X collision Wireless is typically half duplex;; need an alternative B (wire) 3

Collision Detection (CD) How can A know that a collision has taken place? Worst case:» Latency between nodes A& B is d» A sends a message at time t and B sends a message at t + d epsilon (just before receiving A s message) B knows there is a collision, but not A A must keep transmitting until it can tell if a collision occurred How long? 2 * d IEEE 802.3 Ethernet specifies max value of 2d to be 51.2us This relates to maximum distance of 2500m between hosts At 10Mbps it takes 0.1us to transmit one bit so 512 bits take 51.2us to send So, Ethernet frames must be at least 64B (512 bits) long» Padding is used if data is too small Send jamming signal to insure all hosts see collision 48 bit signal 4

Ethernet First local area network (LAN) Developed in early 70s by Metcalfe and Boggs at PARC Originally 1Mbps, now supports 10Mbps, 100Mbps, 1Gbps 10Gbps, 40Gbps, and 100Gbps flavors (400G in dev) Currently the dominant LAN technology Becoming the dominant WAN technology 5

Classic Ethernet IEEE 802.3 standard wired LAN (modified 1-persistent CSMA/CD) Classic Ethernet: 10 Mbps over coaxial cable All nodes share same wire Max length 2.5km, max between stations 500m (wire) Framing nodes Preamble, 32-bit CRC, variable length data Unique 48-bit address per host (bcast & multicast addrs too) Preamble (8) Source (6) Dest (6) Len (2) Payload (var) Pad (var) CRC (4) 6

Ethernet improvements Problems with random delay with fixed mean Few senders = unnecessary delay Many senders = unnecessary collisions Binary exponential back-off balances delay w/load First collision: wait 0 or 1 min frame times at random, retry Second time: wait 0, 1, 2, or 3 times Nth time (n<=10): wait 0, 1,, 2 n -1 times Max wait 1023 frames;; give up after 16 attempts 7

Capture Effect Randomized access scheme is not fair Suppose stations A and B always have data to send They will collide at some time Both pick random number of slots (0, 1) to wait Suppose A wins and sends Next time they collide, B s chance of winning is halved» B will select from 0,1,2,3 due to exponential back-off A keeps winning: said to have captured the channel 8

Ethernet Performance Much better than Aloha or CSMA in practice Source of protocol inefficiency: still collisions More efficient to send larger frames» Acquire the medium and send lots of data Less efficient if» More hosts more collisions needed to identify single sender» Smaller packet sizes more frequent arbitration» Longer links collisions take longer to observe, more wasted bandwidth 9

Contention-free Protocols Problem with fixed partitioning: Inefficient at low load (idle channels) Problem with contention-based protocols: Inefficient at high load (collisions) Ideal(?): Contention-free protocols Try to do both by explicitly taking turns Can potentially also offer guaranteed bandwidth, latency, etc. 10

Contention-free Approaches Polling Token Passing Master node invites slave nodes to transmit in turn Request to Send (RTS), Clear to Send (CTS) messages Control token passed from one node to next sequentially. Point-to-point links can be fast Problems: Polling overhead Latency Single point of failure (master) Problems: Token overhead Latency Single point of failure (token) 11

Token Ring (802.5) D C A B nodes Direction of transmission Token rotates permission to send around nodes Sender injects packet into ring and removes later Maximum token holding time (THT) bounds access time Early or delayed token release Round robin service, acknowledgments and priorities Monitor nodes ensure health of ring (alerts on failures) 12

FDDI (Fiber Distributed Data Interface) Roughly a large, fast token ring First real use of fiber optics in a LAN 100 Mbps and 200km (FDDI) vs 4/16 Mbps and local (802.5) Dual counter-rotating rings for redundancy Complex token holding policies for voice etc. traffic Token ring advantages Break! No contention, bounded access delay Support fair, reserved, priority access Disadvantages Complexity, reliability, scalability

Why Did Ethernet Win? Failure modes Token rings network unusable Ethernet node detached Good performance in common case Completely distributed, easy to maintain/administer Easy incremental deployment Volume à lower cost à higher volume. 14

Summary of Media Access How to divide shared channel among different users Fixed partitioning (FDMA, TDMA, CDMA)» Guaranteed bandwidth for each user, but wasteful when not used and can t allocate different bandwidth to different users Contention-based protocols (CSMA, CSMA/CD)» Try and backoff if fail;; dynamic allocation of bandwidth on demand, works well at load load but collisions a problem at high load Contention-free protocols (Token Ring, FDDI, RTS/CTS)» Explicit turn-taking;; strong guarantees on access time and can make bandwidth guarantees, but complex and fragile to failure But aren t there limits to what we can do with one shared channel? 15

Problems with Busses One shared link (a bus) limits scale in terms of: Distance (e.g., 2500 m for Ethernet) Number of nodes (1024 nodes) Performance (Capacity shared across all nodes) A better alternative is to have multiple busses Each bus is of a limited size, scale, number of hosts, etc. Need the ability to connect multiple busses together In other words move frames from one wire to another 16

Hubs/Repeaters Physical layer device One port for each LAN Repeat received bits on one port out all other ports LAN1 Hub LAN2 LAN3 17

Hub Advantages Hubs can be arranged into hierarchies Ethernet: up to four hubs between any pair of nodes Most of LAN continues to operate if leaf hub dies Simple, cheap 18

Still One Big Bus Single collision domain No improvement in max throughput Average throughput < as # of nodes increases Why? Still limited in distance and number of hosts Collision detection requirements Synchronization requirements Requires performance homogeneity Can t connect 10 Mbps and 100 Mbps networks 19

Bridges Store and forward device Data-link layer device Buffers entire packet and then rebroadcasts it on other ports Creates separate collision domains Uses CSMA/CD for access to each LAN (acts like a host) Can accommodate different speed interfaces (issues?) Separate CDs improves throughput (why?) Can significantly improve performance Not all frames go everywhere. (Why did they with a hub?) 20

For Next Time Read 3.2-3.2.4 in P&D HW2 due next Wednesday 21