Chapter 8 LAN Topologies

Similar documents
LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Lecture 4b. Local Area Networks and Bridges

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

CSE 461: Multiple Access Networks. This Lecture

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

ECE 4450:427/527 - Computer Networks Spring 2017

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Networking Technologies and Applications

Summary of MAC protocols

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Data Link Layer, Part 5. Medium Access Control

Lecture 6: Example LAN: Ethernet

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Link Layer and Ethernet

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

Contention Protocols and Networks

Data Link Layer, Part 3 Medium Access Control. Preface

Link Layer and Ethernet

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Unit II. Part A (2 Marks)

Media Access Control (MAC) Sub-layer and Ethernet

Outline: Connecting Many Computers

Part3. Local Area Networks (LAN)

Medium Access Protocols

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Principles behind data link layer services

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Computer Networks. Medium Access Sublayer (Part I)

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Local Area Networks (LANs) SMU CSE 5344 /

CS4516 Advanced Computer Networks. Final Review

Protocols for Multiaccess Networks

Introduction to Computer Networks. IEEE Ethernet

Redes de Computadores. Medium Access Control

EE 122: Ethernet and

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Direct Link Networks (II)

Computer and Network Security

Multiple Access Channels

1999, Scott F. Midkiff

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Zarządzanie sieciami telekomunikacyjnymi

IEEE 802 LANs SECTION C

COS 140: Foundations of Computer Science

Data and Computer Communications

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

The Link Layer and LANs. Chapter 6: Link layer and LANs

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Chapter 10: Local Area Networks

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

COS 140: Foundations of Computer Science

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

Ethernet. Networks: Ethernet 1

CSE/EE 461 Wireless and Contention-Free Protocols

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

CSE/EE 461 Section 2

Lecture 9: Bridging & Switching"

Lecture (04) Data link layer

Internet Architecture and Protocol

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs

M242 COMPUTER NETWORS AND SECURITY

Principles behind data link layer services:

CS 455/555 Intro to Networks and Communications. Link Layer

Principles behind data link layer services:

ECE 4450:427/527 - Computer Networks Spring 2017

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Direct Link Communication II: Wired Media. Multi-Access Communication

Review of Topology and Access Techniques / Switching Concepts

Communication (III) Kai Huang

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

CSE 461 Multiple Access. David Wetherall

Chapter 5 Link Layer and LANs

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

CCNA Exploration1 Chapter 7: OSI Data Link Layer

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a

Computer Communication Networks

LAN PROTOCOLS. Beulah A AP/CSE

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Chapter 5 Link Layer and LANs

Lecture 05 Chapter 16 High Speed LANs

Transcription:

Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines Advantages Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 1

P-t-P Networks: (continued) Disadvantages Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 2

Multiaccess Networks Problem: P-t-P networks have many lines => high cost Solution: IDEA: the computers must take turns we need an allocation strategy to determine who s turn it is (TDM, FDM, Statistical Multiplexing) Shared lines reduce cost But it means you only get a fraction of the line s bandwidth Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 3

LAN Topologies Networks are typically classified by their shape There are three popular shapes: Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 4

Bus Topologies Shared Bus Connector Wire Figure 2: Example Bus Topology Must solve the Channel Allocation Problem. Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 5

Ring Topologies Computers are connected in a closed loop/ring Packets Travel Around The Ring in Some Direction Figure 3: Example Ring Topology Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 6

All computers connect to Star Topologies If it is a multiaccess star, hosts must synchronize their sending. If hub does store-n-forwarding of messages, then hosts do not need to synchronize. Hub Figure 4: Example Star Topology Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 7

Why Multiple Topologies Each topology has advantages and disadvantages Advantages Bus: Ring: Star: Ring: Disadvantages Bus: Ring: Ring: Star: Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 8

Ethernet: A Bus Network is probably most popular LAN technology developed at Xerox PARC by R. Metcalf and D. Boggs 1976 DEC, Intel, and Xerox developed the DIX ethernet standard later IEEE defined the ethernet standard first versions ran at 3 Mbps current versions run at 10 Mbps and 100 Mbps is a multiaccess network technology is a broadcast-based technology is inexpensive because it uses a passive cable only provides best-effort service higher level protocols do all the real work comes in three varietys: thick net, thin net, twisted pair Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 9

Ethernet Basics Sending Animation Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 10

CSMA/CD Carrier Sense, Multiple Access with Collision Detection Ethernet is just one example of a CSMA/CD protocol The goal is to There is no THE BASIC IDEA of CSMA/CD protocols is: CSMA/CD Animation Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 11

Ethernet Collision Detection Note that CSMA does not prohibit two machines from sending at the same time! Consequently, their signals may collide How do you detect collisions? (Short Packet Animation) Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 12

Two Short Packets that will collide When Packets Collide, Garbage Results (see green line below) Red host sends: Blue host sends: Wire sees: Figure 5: Short Packets might not detect collision Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 13

Collision Detection: (continued) What should the minimum Length Packet be? (See min-length animation) What is the Round Trip Delay of and Ethernet? if we transmit for 51.2 usecs, we will have seen the first few bits of a colliding host before we get done transmitting thus the minimum transmission time = 51.2 usec minimum packet size = Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 14

Ethernet Transmission Algorithm wait till idle line, send immediately, and monitor you may only send 1500 bytes. Why? you must wait 9.6 usec before sending again if you detect a collision, continue sending a jam signal until the end of the 51.2 usec interval (the minimum packet length) to make sure everyone sees the collision. wait a certain (with slight randomness) amount of time and try again if you collide again, double the wait time, then try again, etc. called exponential backoff Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 15

Receiever Algorithm the ethernet card sees all packets sent over the ether the ethernet card runs in one of two modes: Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 16

LocalTalk LAN technology that uses bus topology Interface included with all Macintosh computers Relatively low speed (230.4 Kbps) Low cost ( free with a Macintosh); easy to install and connect Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 17

CSMA/CA LocalTalk uses collision avoidance rather than collision detection CA = Collision Avoidance Transmitting computer sends very short message to reserve bus If reservation succeeds, transmitter can use bus without conflict Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 18

Two popular examples: IBM Token Ring FDDI Example Ring Networks Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 19

IBM Token Ring network manages access to the shared ring via a token Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 20

forward packet s Token Ring Access Points Receiver Sender copy packet and forward Figure 6: (Left) Abstract Ring (Right) Ring in Operation Token Ring Animation Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 21

The Token The token is There is only A computer must hold the token Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 22

Token Passing Algorithm Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 23

Token Ring Failures What kinds of problems/failurs can occur? Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 24

FDDI (Fiber Distributed Data Interface) FDDI was a very popular ring technology Ran at 100 Mbps Still used in some places, but has been largely replaced by other technologies. Gigabit ring networks (follow-ons to FDDI) have also been developed (CSMA/RN) Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 25

Physical Characteristics runs over fiber an alternative version called CDDI runs over copper the attachment stations form a Dual, Counter-Rotating Ring Concentrator DAS SAS SAS Dual Attachment Station (Concentrator) 2 fibers in / 2 fibers out SAS hang off it expensive/complex To a To a Figure 7: Rings, DAS, and SAS only use the outer ring, the inner ring is idle until a failure occurs Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 26

Physical Characteristics: (continued) two types of attachments Dual Attachment Stations (DAS) Single Attachment Stations (SAS) the network is said to be self-healing a DAS has an optical by-pass that fixes SAS failures each DAS monitors connectivity and reverses the ring if a failure occurs X X X Figure 8: Self-Healing Capability Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 27

Physical Characteristics: (continued) has a bandwidth of 100 Mbps, latency depends on ring size max ring size is 100 Kilometers (really 200 Km / 2 rings) max dist between stations is 2 Km max of 500 stations each station adds a 50 ns delay because of an elasticity buffer. uses 4B/5B encoding max packet length is approx 4500 bytes Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 28

Token Rotation Algorithm you are allowed to send data as long as you hold the token How long can you hold the token? Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 29

Setting THT if (THT is small) if (THT is large) TTRT (Target Token Rotation Time) want a TTRT Target Token Rotation Time for the ring that is as big as possible to get the best efficiency, but small enough so that everyone is happy FDDI selects the minimum of all hosts desired TRT s as the ring s TTRT (vie a bidding algorithm) each machine tries to keep the token rotating at the TTRT speed Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 30

Setting THT: (continued) each hosts measures the last rotation time MTRT (Measured Token Rotation Time) if (MTRT < TTRT) the token is moving faster than it needs to you are allowed to hold the token for a maximum of THT = (TTRT - MTRT) if (MTRT >= TTRT) the token is behind schedule you must forfeit your turn and send the token on immediately Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 31

When do you send the token? Token Token Packet Packet Figure 9: When to send the Token? Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 32

Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 33

ATM (Asynchronous Transfer Mode) does not stand for Automated Teller Machine is a packet switching system spans the physical, data link, and network levels standards are still in development (CCITT and ATM forum) highly influenced by the Telephone industry a goal of ATM was to be able to send voice, data, and video over the same network (merge computer and voice networks) also need to carry control information (things needed to support new telephone services like call forwarding, call-waiting, discount dialing plans, etc) In the past this information ran over a parallel network to the voice network. Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 34

Goals and Assumptions 1. ATM networks will be organized as a two-level hierarchy consisting of user and network level machines/switches we need a network-network interface (NNI) and we need a user-network interface (UNI) 2. should provide connection-oriented service; set up a channel to communicate 3. should be run over fiber and have very low error rates subgoal is to provide Quality-of-Service such as guaranteed bandwidth, latency, interpacket arrival times, etc. can only do this is the communication links do not introduce errors 4. should allow low cost attachements (ATM telephone devices) standards body decided to prohibit cell reordering cells must arrive at the receiver in order across the link Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 35

this means end-point devices can be made with much simpler bufferring schemes in particular, they can use FIFO memory instead of RAM memory ATM telephones can just play the samples as they arrive ATM typically carried over some fiber-based data link layer like SONET uses cells (really just another term for packet) Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 36

What is a Cell? Recall that Packets can be any size (i.e., they adjust their size to fit the data) A Cell is just a fixed length packet (usually a small packet) Cells are always the same size (even if you want to send a single bit or byte) ATM uses 53 byte cells : 48 bytes of payload and 5 bytes of header Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 37

small packet caught behind big packet big packet divided into cells Time Packets can cause wasted bandwidth Figure 10: Cells have small queueing delays Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 38

Characteristics of ATM each switch is a star topology switches can by hooked together uses connection-oriented communication between machines destination identified by a connection id ATM ATM Figure 11: Example ATM Network Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 39

Pictures of Real ATM Switches Each machine uses two fiber optic lines to connect to the switch Typically multimode fiber is used running at 155 Mbps Figure 12: Fibers into back of a Sparc IPC Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 40

Pictures of Real ATM Switches Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 41

Univ. of Kentucky CS 471, Spring 2008 - Jim Griffioen 42