ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Similar documents
ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Computer and Network Security

EE 122: Ethernet and

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

IEEE 802 LANs SECTION C

Data Link Layer, Part 5. Medium Access Control

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Multiple Access Channels

IEEE standards for local area networks

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

The Link Layer II: Ethernet

Data Link Layer, Part 3 Medium Access Control. Preface

Ethernet. Networks: Ethernet 1

Link Layer and Ethernet

Link Layer and Ethernet

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Introduction to Computer Networks. IEEE Ethernet

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CSMA/CD (Collision Detection)

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Part3. Local Area Networks (LAN)

EECS 122, Lecture 7. Kevin Fall Jean Walrand

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Introduction to Networks and the Internet

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Lecture 4b. Local Area Networks and Bridges

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Chapter 8 LAN Topologies

Networking Technologies and Applications

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

The MAC Address Format

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Local Area Networks. Ethernet LAN

Contention Protocols and Networks

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

The Link Layer and LANs. Chapter 6: Link layer and LANs

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Medium Access Control

Module 10 Data Link Layer CS655! 10-1!

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

COMP/ELEC 429/556 Introduction to Computer Networks

Zarządzanie sieciami telekomunikacyjnymi

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Redes de Computadores. Medium Access Control

Chapter V: Link Layer

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Media Access Control (MAC) Sub-layer and Ethernet

Internet Architecture and Protocol

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

ECE 4450:427/527 - Computer Networks Spring 2017

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

Network Media and Layer 1 Functionality

2. LAN Topologies Gilbert Ndjatou Page 1

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Chapter 10: Local Area Networks

ECE 4450:427/527 - Computer Networks Spring 2017

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Chapter 3: Industrial Ethernet

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Unit II. Part A (2 Marks)

Chapter 5 Link Layer and LANs

Housekeeping. Fall /5 CptS/EE 555 1

Computer Networks. Medium Access Sublayer (Part I)

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Chapter 5 Link Layer and LANs

6th Slide Set Computer Networks

CARRIER SENSE MULTIPLE ACCESS (CSMA):

EE-379 Embedded Systems and Applications Introduction to Ethernet

Direct Link Networks (II)

COS 140: Foundations of Computer Science

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

CSC 4900 Computer Networks: Link Layer (2)

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

M242 COMPUTER NETWORS AND SECURITY

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

transferring datagram from one node data-link layer has responsibility of to adjacent node over a link 5-1 TDTS06 Computer networks

Lecture 6: Example LAN: Ethernet

Master Course Computer Networks IN2097

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

CS 455/555 Intro to Networks and Communications. Link Layer

CS 3516: Computer Networks

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

Lecture 8 Link Layer: functionality, error detection, media access algorithm

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Data Link Layer -2- Network Access

Chapter 5: The Data Link Layer. Chapter 5 Link Layer and LANs. Ethernet. Link Layer. Star topology. Ethernet Frame Structure.

Reliable Transmission

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Ethernet Standard. Campus Network Design. Ethernet address. OSI Model. Thana Hongsuwan

Protocols for Multiaccess Networks

CSCD 330 Network Programming

Links. CS125 - mylinks 1 1/22/14

COS 140: Foundations of Computer Science

Transcription:

ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework #6 - Presentation on security/privacy Topic selection Due Tuesday, Nov 22 nd Slides Due Monday, Nov 28 th Present! Tuesday, Nov 29 th (and Thursday?) Project #3 Due Tue, Dec 6 th 2

Direct Connection (USB, Firewire, etc ) Via Hub or Switch Wireless 3

Four challenges Encoding How to format bits on wire Different solutions for different media (copper, optical, wireless) Framing How to separate sequences of bits into independent message Error Detection How to detect corrupted messages (and possibly repair them) Media Access Control How to share a single wire or frequency among multiple hosts Goals: Fair between users, high efficiency, low delay, fault tolerant 4

Many competing standards with varying levels of complexity (for both wired and wireless networks) Token Ring (IEEE 802.5) Ethernet (IEEE 802.3) Wi- Fi (IEEE 802.11 a/b/g/n) We focus on Ethernet networks in this course Different standards made different choices, but design principles are similar 5

Original picture drawn by Bob Metcalfe, inventor of Ethernet (1972 Xerox PARC) Ether 19 th century name for media enabling the propagation of light 6

IEEE 802.3 Common MAC protocol and frame format Multiple physical layers to choose from Bus architecture (shared) 10Base- 5 : Original Ethernet Thick coaxial cable with taps every 2.5 meters to clamp on network devices 10Base- 2 : Thin coaxial cable version with BNC T connectors Star architecture (point- to- point) 10Base- F / 10- Base- T standards Introduced later! 7

How to turn bits into physical signals to send across wire? Data transmission across media always distorts data Attenuation (amplitude reduction) Distortion (change in shape) Encoding will make transmitted data resilient to these effects 8

Common challenges to recovering data (ignoring any modulation issues, and only using discrete high and low signals) Baseline Wander Receiver distinguishes between high and low by keeping an average. (Above average = 1, Below average = 0) If data stream contains long periods of 1 s or 0 s, average can shift! Clock Recovery Too expensive to have dedicated clock wire Must examine incoming data and derive clock Derived clock can skew during long periods of all 1 s or 0 s 9

Exclusive- OR of input bit and clock Pulse decoded by direction of the midpulse transition rather than by its sampled level value No long periods without clock transition (prevents receiver clock skew and baseline wander) Drawback: Only 50% efficient! Bit rate (actual data transfer) is half of baud rate (raw channel capacity) Images from Wikipedia and http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/ethernet.htm 10

Bytes: 7 1 6 6 2 0-1500 0-46 4 Preamble SFD DA SA Type Data Pad CRC Gap Preamble Alternating 1 s and 0 s provide data transitions for synchronization Used to train receiver clock- recovery circuit (critical since different transmitters will be using different clocks) SFD (Start of Frame Delimiter) Indicates start of frame data. Always 0xAB DA (Destination Address) / SA (Source Address) Type: Indicates data type or length Pad: Zeroes used to ensure minimum frame length of 64 bytes CRC (Cyclic Redundancy Check) Interframe Gap: Allow time for receiver to recover before next packet Length: 96 times the length of time to transmit 1 bit 9.6 μs for 10 Mbit/s Ethernet, 960 ns for 100 Mbit/s Ethernet, and 96 ns for 1 Gbit/s Ethernet 11

All Ethernet devices have globally unique 48- bit address assigned by manufacturer IEEE assigns OUI (Organizationally Unique Identifier) prefix to each manufacturer Remaining bits are unique per device and chosen by manufacturer Example: 0x 00-07-E9-CB-79-4F 0x 00-07-E9 = Intel Corp (assigned by IEEE) Bit also indicates device is unicast, not multicast 0x CB-79-4F = Unique address per NIC (picked by Intel) Special destination address to broadcast to all devices 0x FF-FF-FF-FF-FF-FF NIC is responsible for filtering packets Address matches (or broadcast)? Send up to host Otherwise, discard 12

How to detect errors in transmission across copper wire / fiber? Ethernet solution 32- bit CRC (Cyclic Redundancy Check) stored in frame header n- bit CRC detects all error bursts not longer than n bits, and a 1-2 - n fraction of all longer error bursts Very useful since most transmission errors on a wire are bursty in nature! 13

Limitations of Ethernet CRC No protection against deliberate corruption or alteration of message in transit Not security! No protection against corruption when packet is transferred through host systems, but only across wire Can still have failures in NIC, memory, data bus (PCI) at either end of the network Insufficient information to recover from error Design decision - More efficient to retransmit upon error than to always send enough redundant bits to repair errors Receiver discards invalid packet Transmitter can optionally retransmit packet (but this is not specified in Ethernet protocol) Calculated by NIC in real- time as packet is transmitted 14

Why do I need a CRC? If Ethernet is unreliable, shouldn t I just let a higher- level protocol detect any errors? 15

CSMA / CD Protocol for Ethernet Carrier Sense Multiple Access with Collision Detection Developed for use with single shared coaxial cable of original Ethernet Decentralized technique No central arbitration, access tokens, or assigned time slots are needed to manage transmission 16

How to Transmit Prepare frame for transmission Check if media is idle ( Carrier Sense ). If not, wait until idle (plus interframe gap) Transmit frame. Listen for any collisions and enter recovery mode If no collision, finish transmitting Max frame size of 1500 bytes prevents one device from monopolizing network Animation from http://www.datacottage.com/nch/eoperation.htm 17

How to Handle Collisions on Shared Ether Continue transmission until minimum packet time is reached to ensure that all receivers detect the collision. Wait random backoff time based on number of collisions Backoff time exponentially increases if >1 collision per frame Restart frame transmission again Animation from http://www.datacottage.com/nch/eoperation.htm 18

Example of worst case collision Two most- distant devices send a frame (A and D) D doesn t start transmitting until frame from A has almost arrived D detects collision almost immediately A doesn t detect collision until data propagates all the way down the wire Maximum time for collision detection Twice the signal propagation time across entire network (for signal from A to reach D and return with collision) A B C D 19

10Mb/s Repeaters every 500m PROP max TRANSP = l / c Packetsize l < 1500m = 1500 / 2.5 10 = 6µ s > 2PROP TRANSP > 12µ s ( 12µ s) 10Mb / s = 120bits In practice, minimum packet size is 512 bits Allows for extra time to detect collisions Allows for repeaters that can boost signal 8 Thick copper coaxial cable 20

Ethernet device receives frames meeting any of the following conditions: Frames addressed to its own MAC address Frames addressed to the broadcast address Frames addressed to the multicast address (if configured for this device) All frames (in promiscuous mode) 21

Previously mentioned design goals Were they accomplished? Fair between users? (What if users cheat?) High efficiency? Low delay? Fault tolerant? 22

Four Networking Challenges Encoding How to format bits on wire Framing How to separate sequences of bits into independent message Error Detection How to detect corrupted messages (and possibly repair them) Media Access Control How to share a single wire or frequency among multiple hosts 23

Where does Ethernet fit in the big picture? Media Access Control Challenge: Who can transmit over a shared channel Channel Partitioning Divide channel into smaller pieces (time slots, frequency, code) Allocate piece to node for exclusive use Random Access Channel not divided, allow collisions Recover from collisions Taking turns Nodes take turns, but nodes with more to send can take longer turns 24

Channel Partitioning (time, frequency) Optical networks for telecom (FDMA) Random Access CSMA Traditional Ethernet 802.11 wireless Taking turns Bluetooth, IBM Token Ring 25