Computer Networks Principles LAN - Ethernet

Similar documents
Computer Networks Principles LAN - Ethernet

The MAC Layer. Contents. Textbook. Jean Yves Le Boudec Fall 2012

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Contents. The MAC layer CN2. 1. MAC as Shared Medium 2. MAC as interconnection at small scale 3. MAC and Link layer. Jean-Yves Le Boudec, EPFL

The MAC Layer. Clicker registration

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CN2 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. The MAC layer. Jean-Yves Le Boudec Fall Jean-Yves Le Boudec, EPFL

Redes de Computadores. Medium Access Control

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Advanced Computer Networks

EE 122: Ethernet and

Link Layer and Ethernet

Link Layer and Ethernet

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

The MAC Layer. Jean Yves Le Boudec 2015

LAN PROTOCOLS. Beulah A AP/CSE

Networking Technologies and Applications

Data and Computer Communications. Chapter 11 Local Area Network

Summary of MAC protocols

The MAC Layer. Jean Yves Le Boudec 2015

The MAC Layer. Mukhopadhyay. Jean Yves Le Boudec 2017

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Principles behind data link layer services

Raj Jain. The Ohio State University Columbus, OH

Medium Access Protocols

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Chapter 5: Link layer

Chapter 5 Link Layer and LANs

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

The MAC Layer. Mukhopadhyay. Jean Yves Le Boudec 2018

CSE 461: Multiple Access Networks. This Lecture

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Ethernet. EE 122: Intro to Communication Networks. Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CS 455/555 Intro to Networks and Communications. Link Layer

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Access Technologies! Fabio Martignon

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Principles behind data link layer services:

Principles behind data link layer services:

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Part3. Local Area Networks (LAN)

Lecture 4b. Local Area Networks and Bridges

The Link Layer and LANs. Chapter 6: Link layer and LANs

Master Course Computer Networks IN2097

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Session Exam 1. EG/ES 3567 Worked Solutions. (revised)

Data Link Layer -2- Network Access

The Medium Access Sublayer

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

The Link Layer II: Ethernet

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Data Link Layer: Multi Access Protocols

Local Area Network Overview

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 5 Link Layer and LANs

Module 10 Data Link Layer CS655! 10-1!

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Principles

Data Link Layer -2- Network Access

CSC 4900 Computer Networks: The Link Layer

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

IEEE standards for local area networks

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Introduction to LAN Protocols

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Chapter 5 Link Layer and LANs

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Introduction to LAN Protocols

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

The MAC Address Format

ET4254 Communications and Networking 1

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Multiple Access Links and Protocols

Master Course Computer Networks IN2097

CSMA/CD (Collision Detection)

Local Area Networks (LANs) SMU CSE 5344 /

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

transferring datagram from one node data-link layer has responsibility of to adjacent node over a link 5-1 TDTS06 Computer networks

Links. CS125 - mylinks 1 1/22/14

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Chapter 11 in Stallings 10 th Edition

VLAN and bridges. Transparent Bridging (TB) Transparent Bridging (TB) LB: Learning Bridge. Several Learning Bridges. Loops. Loop-Free topology

COS 140: Foundations of Computer Science

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Link Layer and LANs. Our Goals. Link Layer

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Data Link Layer: Overview, operations

Local Area Networks. Ethernet LAN

Chapter V: Link Layer

Transcription:

Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1

Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2 subnet 3 subnet 2 switch (bridge) VLAN host 2

Interconnection structure - layer 2 interconnection layer 2 switch (bridge) VLAN host 3

Interconnection at layer 2 Switches (bridges) interconnect hosts logically separate groups of hosts (VLANs) managed by one entity Type of the network broadcast Forwarding based on MAC address flat address space forwarding tables: one entry per host works if no loops careful management Spanning Tree protocol not scalable 4

Protocol architecture 5 Application 4 Transport 3 2 1 Network LLC MAC Physical L2 PDU (LLC Frame) L2 PDU (MAC Frame) LLC MAC Physical host switch (bridge) Switches are layer 2 intermediate systems Transparent forwarding Management protocols (Spanning Tree, VLAN) 5

IEEE 802.3 - Ethernet host transceiver repeater terminator 6

Random Access protocols When node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes -> collision, random access protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) Examples of random access protocols: ALOHA, slotted ALOHA CSMA, CSMA/CD (Ethernet), CSMA/CA (802.11) 7

CSMA/CD (Collision Detection) CSMA/CD (Carrier Sense Multiple Access/ Collision Detection) carrier sensing, deferral if ongoing transmission collisions detected within short time colliding transmissions aborted, reducing channel wastage persistent transmission collision detection: easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: receiver shut off while transmitting 8

CSMA/CD algorithm i = 1 while (i <= maxattempts) do listen until channel is idle transmit and listen wait until (end of transmission) or (collision detected) if collision detected then stop transmitting, send jam bits (32 bits) else wait for interframe delay (9.6 μs) leave wait random time increment i end do 9

CSMA / CD Collision A senses idle channel, starts transmitting 0 A B shortly before T, B senses idle channel, starts transmitting T 10

CSMA / CD Jam Signal B senses collision, continues to transmit the jam signal (32-bit) A senses collision, continues to transmit the jam signal 0 T A B t2 11

Random retransmission interval r = random (0, 2 k -1) k = min (10, AttemptNb) slot time = 51.2 µs 1 st collision, r = 0, 1 2 nd collision, r = 0, 1, 2, 3 10 th, r = 0, 1,, 1023 15 th, stop 12

CSMA / CD Retransmission A waits random time t1 B waits random time t2=slottime < t1 =2*slottime B senses channel idle and transmits A senses channel busy and defers to B A now waits until channel is idle 0 T t1 A B t2 13

Retransmission interval Round trip time Slot limits the interval during which collisions may occur 45 µs + 3.2 µs < 51.2 µs (512 bits) channel is acquired after 51.2 µs non-valid frames (results of collisions) < 512 bits minimal frame size (data field 46 bytes) unit of the retransmission interval 14

Frame format (Ethernet v.2) preamble dest source type data CRC 8 bytes 6 bytes 6 bytes 2 bytes 46-1500 bytes 4 bytes Preamble synchronization : 10101010.0101011 Addresses Type unique, unicast and multicast (starts with the first bit 1) broadcast: 11111 11111 upper layer protocol (IP, IPX, ARP, etc.) 15

Addressing MAC address: 48 bits = adapter identifier sender puts destination MAC address in the frame all stations read all frames; keep only if destination address matches all 1 address (FF:FF:FF:FF:FF:FF) = broadcast B C MAC address A 08:00:20:71:0d:d4 D 00:00:c0:3f:6c:a4 01:00:5e:02:a6:cf (group address) 16

Addressing Data on Ethernet is transmitted least significant bit of first byte first (a bug dictated by Intel processors) Canonical representation thus inverts the order of bits inside a byte (the first bit of the address is the least significant bit of the first byte) examples of addresses: 01:00:5e:02:a6:cf (a group address) 08:00:20:71:0d:d4 (a SUN machine) 00:00:c0:3f:6c:a4 (a PC ) 00:00:0c:02:78:36 (a CISCO router) FF:FF:FF:FF:FF:FF the broadcast address 17

Repeaters Function of a simple, 2 port repeater: repeat bits received on one port to other port if collision sensed on one port, repeat random bits on other port One network with repeaters = one collision domain Repeaters perform only physical layer functions (bit repeaters) Repeater 18

From Repeaters to Hubs Multiport repeater (n ports), logically equivalent to: n simple repeater connected to one internal Ethernet segment Multi-port repeaters make it possible to use point-to-point segments (Ethernet in the box) ease of management fault isolation Multiport Repeater S1 S2 S3 Ethernet Hub UTP segment Multiport Repeater to other hub 19

10 BASE T Hubs hub hub hub Tree topology (star) hub (répéteur multiport) max. 4 hubs 20

Bridges port 1 Bridge A Repeater port 2 port 3 C Forwarding Table Dest MAC addr Port Nb D B A 1 B 2 C 3 D 2 Bridges are intermediate systems, or switches, that forward MAC frames to destinations based on MAC addresses Transparent bridges: learn the Forwarding Table 21

Transparent Bridging (TB) Bridges are intermediate systems that forward MAC frames to destinations based on MAC addresses Interconnect systems beyond one LAN segment, keeping main characteristics of LAN without additional addresses MAC addresses used to identify end systems End systems ignore that there are transparent bridges bridge is transparent MAC frames not changed by bridges frames not sent to bridge, but rather: bridge is promiscuous listens to all frames and retransmits if needed 22

Collision domains bridge hub hub Bridges separate collision domains a bridged LAN maybe much larger than a repeated LAN there may be several frames transmitted in parallel in a bridged LAN 23

Repeaters and Bridges in OSI Model 5 to 7 Application Presentation Session Application Presentation Session 5 to 7 4 Transport Transport 3 2 Network LLC MAC L2 PDU (MAC Frame) MAC L2 PDU (MAC Frame) Network LLC MAC 4 3 2 1 Physical Physical Physical Physical 1 End System Repeater/Hub Bridge End System Bridges are layer 2 intermediate systems Repeaters are in layer 1 intermediate systems Routers are layer 3 intermediate systems (IP routers) 24

Protocol architecture 5 4 3 Application Transport Network L3 PDU (IP packet) Application 5 Transport 4 Network 3 2 1 LLC MAC Physical L2 PDU (MAC Frame) LLC MAC Physical L2 PDU (MAC Frame) LLC MAC Physical 2 1 host switch (bridge) router Routers are layer 3 intermediate systems Explicit forwarding host has to know the address of the first router Management protocols (control, routing, configuration) 25

Switched Ethernet Switched Ethernet = bridge in the box Total bandwidth is not shared parallel frame transmission Half and full-duplex operation Bridge Bridge 1 2 3 4 5 1 2 3 4 5 A B C D U V W X 2 6

Switching Store and forward receive full frame, check if valid, retransmit 50 µs delay for a 64 bytes frame Cut through address read, retransmit at line speed 14 bytes read and decision made on output link if link busy, defaults to store and forward 20 µs delay for a 64 bytes frame transmission of non-valid frames CRC check at end of forwarding Flow control back pressure using false collision notification on full duplex links, send PAUSE to hosts 2 7

VLAN - Virtual LAN Keep the advantages of Layer 2 interconnection auto-configuration (addresses, topology - Spanning Tree) performance of switching Enhance with functionalities of Layer 3 extensibility spanning large distances Bridge/Switch traffic filtering Limit broadcast domains Security separate subnetworks 1 2 3 4 5 A B C D E VLAN1 VLAN2 28

Virtual LANs No traffic between different VLANs VLANs build on bridges or switches Bridge/Switch trunk Bridge/Switch 1 2 3 4 5 1 2 3 4 5 A B C D E X Y Z U T VLAN1 VLAN2 VLAN1 VLAN2 29

802.1Q VLAN1 A trunk D S T data D S t tag T data Frame encapsulation 802.3 frame 802.1/P frame extension for assigning frame priority and VLAN tag t - 2 bytes of TPI (Tag Protocol Identifier): 0x8100 tag - 2 bytes of TCI (Tag Control Information): priority (3 bits), VLAN Id (12 bits) (VID 0x001 often reserved for management) max length = 1522 bytes 30

Tagged VLANs VLAN table A B C 1 2 3 SWITCH 4 5 6 D VLAN 1 VLAN 2 E trame non taguée 5 trame taguée VLAN 2 VLAN tag ports 1 untagged 1, 4, 5 1 tagged 2 2 untagged 2,3 interface physique em0 em0.2 IP em0 IP em0.2 E interface virtuelle 2 tagged 5 31

Summary Original Ethernet is a shared medium: one collision domain per LAN Bridges are connectionless intermediate systems that interconnect LANs Using bridging, we can have several collision domains per LAN Ethernet switches use bridging State of the art switched 100 Mb/s Ethernet to the host 1 Gb Ethernet between switches Wireless LANs become increasingly popular WiFi, Bluetooth 32