Access Technologies! Fabio Martignon

Similar documents
Access Technologies. Fabio Martignon

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Data Link Layer -2- Network Access

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Data Link Layer -2- Network Access

Redes de Computadores. Medium Access Control

Ethernet. Introduction. CSE 3213 Fall 2011

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Data Link Layer, Part 3 Medium Access Control. Preface

Protocols for Multiaccess Networks

Multiple Access Protocols

Data and Computer Communications. Chapter 11 Local Area Network

Data and Computer Communications

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Computer Networks Principles LAN - Ethernet

COMMUNICATION NETWORKS NETW 501

ECEN 5032 Data Networks Medium Access Control Sublayer

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Data Link Layer: Collisions

Lecture 4b. Local Area Networks and Bridges

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Part3. Local Area Networks (LAN)

Multiple Access. Data Communications and Networking

LAN PROTOCOLS. Beulah A AP/CSE

Local Area Networks (LANs) SMU CSE 5344 /

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Data Link Layer, Part 5. Medium Access Control

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Summary of MAC protocols

Medium Access Protocols

EE 122: Ethernet and

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

CMPE 257: Wireless and Mobile Networking

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Chapter 6 Medium Access Control Protocols and Local Area Networks

Contention Protocols and Networks

CSE 461: Multiple Access Networks. This Lecture

ET4254 Communications and Networking 1

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Networking Technologies and Applications

Chapter 4. The Medium Access Control Sublayer

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

ECE 4450:427/527 - Computer Networks Spring 2017

Arhitecturi și Protocoale de Comunicații (APC) Rețele locale (I)

Unit 7 Media Access Control (MAC)

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

COS 140: Foundations of Computer Science

ECE 4450:427/527 - Computer Networks Spring 2017

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Introduction to Networks and the Internet

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Link Layer and Ethernet

Wireless Communications

The Link Layer and LANs. Chapter 6: Link layer and LANs

Aloha and slotted aloha

Distributed Queue Dual Bus

LAN Overview (part 2) Interconnecting LANs - Hubs

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Introduction to LAN Protocols

CSMA/CD (Collision Detection)

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Chapter 12 Multiple Access 12.1

The Medium Access Sublayer

Interface The exit interface a packet will take when destined for a specific network.

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Ethernet. Networks: Ethernet 1

Link Layer and Ethernet

Real-Time (Paradigms) (47)

CMPE 257: Wireless and Mobile Networking

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Lecture 6: Example LAN: Ethernet

Media Access Control (MAC) Sub-layer and Ethernet

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Computer Networks. Medium Access Sublayer (Part I)

Applied Networks & Security

Direct Link Communication II: Wired Media. Multi-Access Communication

Medium Access Control Sublayer Chapter 4

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L5 Data link (part 2)

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Multiple Access Links and Protocols

The Medium Access Control Sublayer

Applied Networks & Security

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Chapter 11 in Stallings 10 th Edition

ECE 158A: Lecture 13. Fall 2015

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

COS 140: Foundations of Computer Science

Computer Networks. Wenzhong Li. Nanjing University

Transcription:

Access Technologies! Fabio Martignon 1

LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several Extensions

Local Area Networks IEEE 802 Working Group 802.1 802.1D LAN Interconnection Medium Access Control 802.2 Data Link Layer 802.3 802.5 802.11 Physical layer

Addressing (on a broadcast medium) A B C D B B B

Topology Bus Topology (historical) tap line terminal Switch Star Topology The switch is like a repeater: whenever a frame is received from a station, it is transmitted towards all other stations

IEEE 802.3 Frame! Ethernet Frame 7 Sync 1 6 6 2 0-1500 Destination Source Fr. SD Length payload 10101011 PAD This field indicates the length of the payload field + eventual PADding field 4 FCS 802.3 Frame minimum length = 512 bit (1 slot) equivalent to 51.2 us Propagation speed 2 x 10 8 m/s (5 us/km) Maximum LAN diameter = 2.5 Km!

802.3 vs Ethernet! They re not the same: 802.3 has a LLC (802.2) ethernet is directly connected with the network layer E.g.:! IP LLC (802.2) MAC (802.3) IP Ethernet

802.3 vs Ethernet! The protocol field in Ethernet is used to identify the network SAP In many LANs Ethernet and 802.3 coexist. The Frame Length Field can be in the range 0-1500 The protocol field is >1500 (to be precise, the standard says >1536, decimal notation, which means 0600 in hexadecimal)! 7 Sync 1 6 6 2 0-1500 Destination Source Frame SD Lenght payload PAD 4 FCS 802.3 7 1 6 6 2 0-1500 4 Sync SD Destination Source Protocol payload PAD FCS Ethernet Note: in this latter case, the standard MAC says that it is the MAC client protocol (e.g., IP or the upper level that uses Ethernet) that must operate correctly in case Padding is introduced at the MAC layer (in other words, the correct functioning is demanded at the upper layer)

Access Protocols Problem: If two (or more) stations try to transmit at the same time, we have a collision the signal (hence, the frames) is not received correctly We need protocols (rules) to control the access to the broadcast medium, in order to avoid (or at least, to limit) collisions If collision occur, they must be correctly individuated by all stations, in order to re-send the collided frames This function is performed in Ethernet at the MAC (Medium Access Control) sublayer Logical Link Control Medium Access Control Data Link layer

Conceptual Model of Multiple Access A B C D Station A Station B Station C Station D Master Channel The Master does not know if and how many packets are present in each queue (i.e., if and how many packets are produced by each station) Each station does not know the state of other stations queue

Multiple Access Techniques Classification We have two types of access techniques Ordered Access TDMA Round Robin Polling Roll Call Polling Hub Polling Random Access CSMA/CD (Ethernet) CSMA/CA (IEEE 802.11, WiFi)

Example: TDMA A B C D A B C D A B C D In LANs, taffic is bursty, and we have several stations t TDMA is inefficient: high delays, low throughput

Example: Round Robin Each station has, in each round, the opportunity to transmit When it is the turn of the station: if she has no packet to transmit: she declines the transmission opportunity, which will be given to the subsequent station if she does have packets to transmit: she transmits her packets up to a maximum number (K), defined by the protocol itself Then, the transmission opportunity (the right to transmit) is sent to the subsequent station

Example: Round Robin 2 1 2 1 3 6 5 4 3 1) 2) 7 3) 7 7 6 5 4 3 5 4 3 9 8 Maximum number of transmissions per station = K = 3 6 4)

Ordered Access: Polling Roll-call polling Master Station 1 Station 2 Station N The token (the control packet which guarantees the transmission opportunity) is always sent back to the Master station Hub polling Master Station 1 Station 2 Station N The token comes back to the Master only at the end of the cycle

Random Access Protocols Random access protocols do not have an explicit coordination among stations hence, collisions may occur They differ in how they resolve collisions and also in the feed-back from the channel (i.e., the information that derives from listening to the channel) Collisions are overcome by introducing a random mechanism

Random Access Protocol Example: Slotted Aloha Slotted channel (time is divided into slots) When a packet arrives at a station, she tries to send it in the first available slot If a collision occurs, the station tries to re-send it after a random number of slots such random number is chosen uniformly at random in an interval [0,r] r = 5 Collision in this slot! t

Slotted Aloha: Collision Resolution If r = 0 collision repeats infinite times! throughput = 0 r = 0 If the offered traffic is high, we need a high r value to avoid instability t To summarize: we would like to have small r values when the network is empty and large r values when the network is congested!!!

Aloha: Performance analysis In Aloha, the access mechanism is very simple: When there is a packet to be transmitted, just transmit it. If transmission fails, wait for a random time and retransmit

Aloha: Performance analysis

Aloha and Slotted Aloha: Performance analysis

Aloha and Slotted Aloha: Performance analysis Unfortunately, the traffic on the channel is the combination of new transmissions and retransmissions, and it can therefore increase if throughput reduces To evaluate the dynamic behavior of Aloha, it is necessary to consider enhanced models

Carrier Sense Multiple Access CSMA has been created for systems in which the station can listen to the channel (Carrier Sense) Transmission is possible only if the channel is sensed free (listening before transmitting) Collisions are still possible due to the so called vulnerable period t 2 -t 1 <τ A B C D A B C D t 1 t 2 t 1, t 2 : instants at which the fartherst stations (A and D) start transmitting a frame after having seen that the channel is (apparently) free

Vulnerable Period Transmission starts collision t Vulnerable period = 2 τ t τ : propagation time between the two farthest stations (A and D) T : frame duration, must be larger than 2τ

Variations to Carrier Sense If a station senses the channel and finds it already active (i.e., not free): the transmission is postponed after a random time (just as if a collision occurred) (non persistent) the transmission starts immediately when the channel becomes free again (persistent) with probability p the station uses the persistent approach, with 1-p the non persistent one (p-persistent)

CSMA- Collision Detect (CSMA/CD) In some channels (e.g., wired ones) it is possible for a station to discover if a collision occurred The time necessary for all stations on the bus to see that a collision really occurred depends on the propagation time (which is smaller than the frame transmission time in LANs) Why continue transmitting after the station knows that the frame experienced a collision? Idea: whener the station knows that a collision occurred, she stops immediately sending the rest of the frame CSMA-CD

Ethernet - IEEE 802.3 Protocol (CSMA/CD)! If the channel is sensed free, the transmission is performed If the channel is busy, transmission is refrained; transmission happens as soon as the channel is free again (persistent) If a collision happens, transmission is aborted after transmitting 32 more bits of jamming sequence After a collision, the next transmission is attempted after X time slots X is randomly chosen between 0 and 2 min(k,10) K number of consecutive collisions, K<=16 (exponential binary backoff) After 16 failed attempts the frame is dropped!

Interconnecting Local Networks Lan 1 Interconnecting Device Transparent Bridging Collision Domains Separation BRI DGE Lan 2 Single Broadcast Domain, Different Collisions Domains

Bridge IP ARP LLC MAC Layer 1 MAC Layer 1 Bridge MAC relay MAC Layer 1 Lan 1 Lan 2 IP ARP LLC MAC Layer 1 Functionalities: Filtering: if a frame generated within LAN 1 is destined to LAN 1 it remains confined within LAN 1 Relaying: if a frame originated within LAN 1 is destined to LAN 2 it is relayed by the bridge (possible MAC translation)

Repeaters & Bridges bit Repeater Bits Store and forward frames Bridge Frames Store and forward

Bridge Architecture Filtering and Relaying are performed according to a local Forwarding Data Base (or FDB) Lan 2 Lan 1 CPU Port A Lan # 1 Port B Lan # 2 Filtering Database Filtering Database MAC address Port Destination Out Port

Bridge Forwarding Frame Correctly received on port X Is the destination in the FDB? NO YES YES Is the out port X? Forward the frame through all the ports but X Drop the frame NO Forward the frame on the specified out port

How to Fill/Update the FDB: Backward Learning Received Frame Validity Timer on the FDB Entries (default: 300 s) Is the sender in the FDB? YES Update Out Port and Timers NO Add the sender to the FDB, set Out Port and Timers End

An Example D.MAC E.MAC F.MAC G.MAC Ethernet 1 Port 1 Port 2 Ethernet 2 Filtering Database MAC address Port A.MAC B.MAC C.MAC

An Example D.MAC E.MAC F.MAC G.MAC Port 2 Ethernet 2 Ethernet 1 Filtering Database MAC address Port C Port 1 A.MAC 1 A.MAC B.MAC C.MAC Backward Learning

An Example D.MAC E.MAC F.MAC G.MAC Since C is not in The FDB The frame goes through all the ports C Porta 2 Ethernet 2 Ethernet 1 Porta 1 Filtering Database MAC address Port A.MAC 1 A.MAC B.MAC C.MAC

An Example D.MAC E.MAC F.MAC G.MAC A is reachable through The same port 1: filtering Port 2 Ethernet 2 Ethernet 1 Port 1 A Filtering Database MAC address Port A.MAC 1 C.MAC 1 A.MAC B.MAC C.MAC Backward Learning

Complete FDB D.MAC E.MAC F.MAC G.MAC Port 2 Ethernet 1 Port 1 A.MAC B.MAC C.MAC F Ethernet 2 Filtering Database MAC address Port A.MAC 1 B.MAC 1 C.MAC 1 D.MAC 2 E.MAC 2 F.MAC 2 G.MAC 2

An Example D.MAC E.MAC F.MAC G.MAC F is not reachbale through the same port 1 forwarding Ethernet 2 F Port 2 Ethernet 1 Porta 1 A.MAC B.MAC C.MAC Filtering Database MAC address Port A.MAC 1 B.MAC 1 C.MAC 1 D.MAC 2 E.MAC 2 F.MAC 2 G.MAC 2

Broadcast Storm A.MAC A is unknown. FDB Updated Frame forwarded Lan 1 MAC Port address Z X MAC Port address B.MAC W B.MAC Y W A Lan 2 Y 1 B.MAC

Broadcast Storm A.MAC A is not in FDB Frame is forwarded FDB Entry Updated 2 Lan 1 MAC Port address Z A X MAC Port address B.MAC Z B.MAC X W Lan 2 Y B.MAC

Broadcast Storm A.MAC A is not in FDB Frame is forwarded FDB Entry Updated Lan 1 MAC Port address Z X MAC Port address B.MAC W B.MAC Y W A Lan 2 Y 3 B.MAC

Spanning Tree! Problem: LAN topologies are usually meshed for fault tolerance Lan 5 Lan 1 Lan 4 Lan 2 Lan 3 Bridging and Backward Learning work on a tree topology Broadcast Storm is due to cycles in the topology graph!

The Spanning Tree Algorithm! To get a logical tree topology from a physical mesh one. The tree topology is obtained blocking some ports A blocked port filters data frame and relays control frames (spanning tree)! Lan 5 Lan 1 Lan 4 Lan 2 Blocked port Lan 3 Blocked port

The Spanning Tree Algorithm 5 8 5 1 2 3 6 4 6 1

The Spanning Tree Algorithm! The Root bridge is elected Each bridge individuates the root port the port with the lowest distance to the root bridge In each LAN a designated bridge is chosen. The port interconnecting the designated bridge with its LAN is called the designated port The root ports and the designated ports are active, the others are put in a blocked status. The resulting topology is a spanning tree.!

Root Bridge Election! The first Step is the Root Bridge Selection. The choice is based on the Bridge ID (64 bits) 16 bit 48 bit Priority Bridge MAC Address The bridge with the lowest Bridge ID is the Root Bridge!

Root Port Selection! Once the Root Bridge is elected, each Bridge selects the Root Port lowest distance to the Root Bridge The distance is expressed as a cost through the Root Path Cost parameter (it often corresponds to the number of hops)!

Designated Bridge Port Selection! A Designated Bridge for each LAN segment is selected. It forwards the frames towards the root Bridge The bridge with minimum distance towards the Root Bridge becomes the Designated Bridge (if equivalent, lowest Bridge ID criteria) The Designated Bridge is connected to the LAN segment through the Designated Bridge Port! All the ports of a Root Bridge are Designated Bridge Ports!

Spanning Tree: An Example Bridge_Prio: 16.384 Bridge_MAC_address: 08-00-2b-51-11-21 Lan 5 Lan 1 32.768 00-00-0c-10-a0-30 Lan 4 16.384 08-00-2b-10-15-20 Lan 2 32.768 00-00-0c-10-15-04 Lan 3 8.192 08-00-2b-aa-50-30 Before the ST algorithm

Spanning Tree: An Example Bridge_Prio: 16.384 Bridge_MAC_address: 08-00-2b-51-11-21 32.768 00-00-0c-10-a0-30 RP 32.768 00-00-0c-10-15-04 Lan 5 RP Lan 4 DP DP RP Lan 1 Lan 2 Lan 3 DP RP 16.384 08-00-2b-10-15-20 8.192 08-00-2b-aa-50-30 After the ST algorithm

Logical Bridging Graphs! Lan 5 Lan 1 Lan 5 Lan 1 Lan 4 Lan 2 Lan 4 Lan 2 Lan 3 Physical Topology Lan 3 Logical Topology