Networking Technologies and Applications

Similar documents
Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Data and Computer Communications

Contention Protocols and Networks

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Principles LAN - Ethernet

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

LAN PROTOCOLS. Beulah A AP/CSE

Ethernet. Computer Networks. Lecture 4.

EE 122: Ethernet and

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Data Link Layer, Part 5. Medium Access Control

ECE 158A: Lecture 13. Fall 2015

Data Link Layer -2- Network Access

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Data Link Layer, Part 3 Medium Access Control. Preface

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Ethernet. Networks: Ethernet 1

Data Link Layer -2- Network Access

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Medium Access Control Sublayer

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CSE 461: Multiple Access Networks. This Lecture

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Zarządzanie sieciami telekomunikacyjnymi

CSCD 330 Network Programming Winter 2016

Chapter 9. Ethernet. Part II

LAN Systems. Bus topology LANs

Link Layer and Ethernet

Link Layer and Ethernet

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 05 Chapter 16 High Speed LANs

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Summary of MAC protocols

Data and Computer Communications. Chapter 11 Local Area Network

Lecture (04) Data link layer

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Local Area Networks (LANs) SMU CSE 5344 /

COS 140: Foundations of Computer Science

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Lecture (04) Network Access layer fundamentals I

Lecture (04) Network Access layer fundamentals I

Lecture 4b. Local Area Networks and Bridges

Multiple Access Channels

Lecture (04 & 05) Data link layer fundamental

Chapter 8 LAN Topologies

Ethernet. Introduction. CSE 3213 Fall 2011

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Part3. Local Area Networks (LAN)

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Protocols for Multiaccess Networks

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

Campus Network Design

Introduction to Computer Networks. IEEE Ethernet

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Chapter 10: Local Area Networks

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

Introduction to Networks and the Internet

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Computer Networks. Medium Access Sublayer (Part I)

Chapter 12 Multiple Access 12.1

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Networks Homework # 2

Medium Access Protocols

Ethernet Standard. Campus Network Design. Ethernet address. OSI Model. Thana Hongsuwan

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

Lecture 6: Example LAN: Ethernet

Principles behind data link layer services

Direct Link Communication II: Wired Media. Multi-Access Communication

IEEE standards for local area networks

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Lecture 8: Switched Ethernet and Collision Domains

COS 140: Foundations of Computer Science

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

ECE 4450:427/527 - Computer Networks Spring 2017

The Link Layer and LANs: Ethernet and Swiches

Access Technologies! Fabio Martignon

CSCD 330 Network Programming Winter Lecture 17b Link Layer Protocols Who is this? Reading: Chapter 5

Raj Jain. The Ohio State University Columbus, OH

The Medium Access Sublayer

IEEE 802 LANs SECTION C

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Master Course Computer Networks IN2097

Chapter 9 Ethernet Part 1

CSCD 330 Network Programming Spring 2017

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Medium Access Control

EECS 122, Lecture 7. Kevin Fall Jean Walrand

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Redes de Computadores. Medium Access Control

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Transcription:

Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016

Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution is quite efficient If higher traffic, the solution is unusable 2

Slotted Aloha Time is divided into slots Fixed length slots to transmit fixed size packets If a node wants to send, waits until a new slot begins Need to synchronize the nodes If nobody else sends in the same slot, then the sending is sucessful Otherwise collision, the packet is resent after waiting for a random amount of time 3

Ethernet Bob Metcalfe (MIT, Harvard) spends his holiday together with Abramson on Hawaii Idea: let s do something similar, but for a wired network (1973) First standard (DEC, Intel, Xerox) in 1982, IEEE 802.3 standard in 1983 Many stations connected to the same cable segment Everyone hears everyone, but without any central node The Ethernet frames will have to have a destination address Everyone hears it, but the frame will be processed only by the destination 4

Ethernet = CSMA/CD Before transmission, hosts on the same Ethernet cable first listen to the channel (CSMA Carrier Sense Multiple Access) If busy, they wait for the transmission to end If free, start sending Not immediately, but after a slot time If there is a signal on the channel, it leaves time for it to be received Slot time = maximum round-trip time on the cable For 10 Mb/s Ethernet it is 51,2 μs, for 100 Mb/s is 5,12 μs Two stations might think in parallel that the channel is free Both start sending, a collision occurs If collision, they detect it (CD Collision Detection), and send a jam signal to ensure that others detect the collision as well 5

Ethernet = CSMA/CD Wait for a random time interval and retry afterwards Set a timer to a random value from the [0, 1,.., 2 m-1 ] x t av interval, where t av is the default waiting time (51,2 μs), m = min (10,n) and n is the number of collisions. After each collision the maximum waiting time is doubled, until reaching an upper limit - truncated binary exponential backoff CSMA/CD not possible on Alohanet Two users on the remote islands could not hear each other 6

Encapsulation 7

Ethernet Frame The DATA field is at most 1500 bytes (MTU Maximum Transmission Unit) If frame too large, it occupies the channel for long time Higher possibility of an error, you will need to resend large frames Minimum length 46 bytes (minimal frame size = 64 bytes = 512 bits) If the frame too small, collision detection cannot be used Transmission is terminated very fast, before the first bit reaching the end of the cable 51,2 μs round trip time / 0,1 μs bit time = 512 bit Even if there s a collision, the sender is not informed about it Packets that are too small are filled with padding data (bits with no utility) 8

Carrier Extension If the speed of the network increases... Either increase the minimum frame size... Or decrease the maximum cable length On a 2500 m cable, for a 1 Gb/s speed, the minimum frame size is 6400 bytes If the minimum size is 640 bytes, the cable can be only 250 m long Very annoying restrictions on a Gigabit network Minimum frame size increased to 512 bytes Carrier Extension The sender puts the useless bits after the CRC field The receiver cuts it of, not included in the CRC Still a serious waste of capacity Frame Bursting During a single transmission, several consecutive frames transmitted Increases efficiency considerably 9

First Ethernet versions 10Base5 thick Ethernet Coaxial cable, 10 Mb/s, 500 m long segments 10Base2 thin Ethernet Coaxial cable, 200 m segments 10Base-T Twisted pair, star topology around a, 100 m segments 10Base-F Optical fiber, 2km long segments 10

Fast Ethernet 100Base-TX 2 twisted pairs One for the upstream, one for the downstream, 100 Mb/s duplex speed 100Base-T4 4 twisted pairs One for the upstream, one for the downstream data, the other two can be used as needed Maximum 100 m long segments 100Base-FX Multi-mode fiber in both directions 100 Mb/s duplex speed Maximum 2 km between the and the stations 11

Gigabit Ethernet IEEE 802.3z (1998), 802.3ab (1999) Only point-to-point setups No shared segments, as in traditional 10 Mb/s Ethernet Two operation modes: Duplex traffic in both directions in the same time A central switch links the stations on the periphery All the connections are buffered Any station can send data at any time No need to sense the channel, no contention No need for CSMA/CD, not really Ethernet anymore Half-duplex Stations are connected to a simple No buffering, collisions are possible 12

Gigabit Ethernet Different versions 1000Base-SX Multi-mode fiber Maximum 550 m long segments 1000Base-LX Single- or multi-mode fiber Maximum 5000 m long segments 1000Base-T 4 pairs of Cat. 5 UTP cables Maximum 100 m long segments IEEE 802.3ae 10 Gb/s Ethernet (2002) Only on optical cables IEEE 802.3ba 40Gb/s and 100 Gb/s Ethernet (2010) Lucent Technologies Bell Labs experimental results Standard adopted in June 2010 13

Hub Physical layer repeater device Repeats the packet on bit level An incoming packet is forwarded immediately on all the other interfaces Everyone receives all the packets If many simultaneous transmissions - collision The collision domain is not changed Usually a hierarchical, tree-like topology 14

Hub advantages and drawbacks Each station can collide with any other station on the Lowers the efficiency of the network Lowers scalability Anyone can see anyone s traffic Different Ethernet versions cannot be joined in the same network If one 10Mbps station in the network, the entire network switches back to 10 Mbps operation mode 15

Hub Not efficient to build a large network using only s One large collision domain Collision domain 16

Switch (bridge) Link Layer device Checks the MAC header, and forwards selectively switch table: (MAC address, interface, timer) Built from the received packets If one address is unknown, the packet is forwarded to all the interfaces Separates the collision domains Buffers the packets Forwards them only to the appropriate segments 17

Switch Advantages: Higher scalability More efficient, more secure Buffering and switching tables makes the connection of different Ethernet versions possible inside the same network switch Collision domain Collision domain Collision domain 18

Corporate network External network router mail server web server switch IP subnet 19