Chapter 4: The Medium Access Layer

Similar documents
Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Outline. EEC-484/584 Computer Networks. Multiple Access Protocols. Wireless LAN Protocols. Lecture 9. Wenbing Zhao

EEC-484/584 Computer Networks

Outline. EEC-682/782 Computer Networks I. Multiple Access Protocols. IEEE 802 Standards

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Computer Networks. Medium Access Sublayer (Part I)

EE 122: Ethernet and

The Medium Access Control Sublayer

Redes de Computadores. Medium Access Control

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Wireless Communications

Multiple Access Links and Protocols

Medium Access Control Sublayer Chapter 4

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Chapter 12 Multiple Access 12.1

CMPE 257: Wireless and Mobile Networking

ECEN 5032 Data Networks Medium Access Control Sublayer

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Medium Access Control Sublayer Chapter 4

Wireless Local Area Networks. Networks: Wireless LANs 1

Direct Link Communication II: Wired Media. Multi-Access Communication

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Part3. Local Area Networks (LAN)

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala Set 5. February 12 CMSC417 Set 5 1

COS 140: Foundations of Computer Science

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

Summary of MAC protocols

Networking Technologies and Applications

Data and Computer Communications. Chapter 13 Wireless LANs

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Data and Computer Communications

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Medium Access Protocols

Link Layer and Ethernet

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Link Layer: Retransmissions

CMPE 257: Wireless and Mobile Networking

Unit 7 Media Access Control (MAC)

COS 140: Foundations of Computer Science

Data Link Layer, Part 3 Medium Access Control. Preface

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Ethernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain

Data Link Layer, Part 5. Medium Access Control

Link Layer and Ethernet

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Direct Link Communication II: Wired Media. Multi-Access Communication

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

CS4516 Advanced Computer Networks. Final Review

Telecommunication Protocols Laboratory Course. Lecture 2

Local Area Networks NETW 901

CS 455/555 Intro to Networks and Communications. Link Layer

IEEE 802 LANs SECTION C

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Lecture 4b. Local Area Networks and Bridges

Distributed Queue Dual Bus

Lesson 2-3: The IEEE x MAC Layer

Lecture 16: QoS and "

The Link Layer and LANs. Chapter 6: Link layer and LANs

Data Communications. Data Link Layer Protocols Wireless LANs

Mohamed Khedr.

Ethernet. Computer Networks. Lecture 4.

College of Computer and Information Sciences Department of Computer Engineering CEN444 Computer Networks Midterm 2 Exam Second Semester 1434/1435

COMP/ELEC 429/556 Introduction to Computer Networks

Chapter 6 Medium Access Control Protocols and Local Area

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CSE 461: Multiple Access Networks. This Lecture

Wireless Local Area Networks (WLANs) and Wireless Sensor Networks (WSNs) Primer. Computer Networks: Wireless LANs

CSE 461 Multiple Access. David Wetherall

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Computer Networks. Wireless LANs

Multiple Access in Cellular and Systems

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Data and Computer Communications. Chapter 11 Local Area Network

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

MULTIPLE ACCESS PROTOCOLS 2. 1

ECE 4450:427/527 - Computer Networks Spring 2017

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

CSE 461: Wireless Networks

IEEE standards for local area networks

Transcription:

Chapter 4: The Medium Access Layer Computer Networks Maccabe Computer Science Department The University of New Mexico September 2002

Medium Access Layer Point-to-point versus broadcast networks Broadcast multiaccess channels random access channels Arbitrate contention General coverage of LANs Chapter 4 p.2/69

Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.3/69

Channel Allocation Static Allocation FDM and TDM are examples of static allocation Traffic is bursty, mean to peak ratio of 1:1000 Mean delay: where T 1 µc λ C is channel capacity in bps λ is arrival rate in frames/sec 1 µ is the mean frame length in bits/frame µc is the service rate Replace channel with N C 1 T FDM µ C N λ N bps channels N N µc λ NT Chapter 4 p.4/69

Channel Allocation Dynamic Allocation Station Model: N independent stations probability of frame generation in interval t is λ t station blocks until frame is transmitted Single Channel no external channels Collision simultaneous transmission results in garbled signal Time Continuous Slotted time is divided into discrete intervals Carrier No sense channels transmit then look for collisions Sense stations wait while channel is busy frame transmission can start at any time Chapter 4 p.5/69

Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.6/69

MAC Protocols ALOHA Carrier Sensed Multiple Access (CSMA) Collision-Free Protocols Limited-Contention Protocols (skip) Wavelength Division Multiple Access Protocols (skip) Wireless LAN Protocols Chapter 4 p.7/69

ALOHA Pure ALOHA Stations transmit and look for collisions (could wait for ACKs if unable to listen while transmitting) Random time for backoff (avoids lockstep) User A B C D E Time Chapter 4 p.8/69

ALOHA Efficiency Let t be the time to transmit a frame Vulnerable period for a frame is 2t Collides with the start of the shaded frame t Collides with the end of the shaded frame t o t o + t t o + 2t t o + 3t Time Vulnerable Chapter 4 p.9/69

ALOHA Efficiency Let G be the mean transmissions (old and new) per frame time Probability of k frames generated during a frame time is: G k e G Pr[k] k! 2G frames in an interval of length 2t Throughput is (offered load times probability of no collisions) S Ge 2G Chapter 4 p.10/69

ALOHA Efficiency S (throughput per frame time) 0.40 Slotted ALOHA: S = Ge G 0.30 0.20 0.10 Pure ALOHA: S = Ge 2G 0 0.5 1.0 1.5 2.0 3.0 G (attempts per packet time) Chapter 4 p.11/69

ALOHA Slotted Can only start at the beginning of a slot Reduces vulnerability by 1/2 S Probability of a collision is 1 e G Probability of requiring k attempts P k e G 1 e G Expected number of transmissions k 1 Ge G E k 1kP k k 1 ke G 1 e G k 1 e G Chapter 4 p.12/69

Carrier Sense Multiple Access 1-persistent: sense, when free transmit propagation delay nonpersistent: slotted, random delay when slot busy p-persistent: transmit with probability p when slot is idle S (throughput per packet time) 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 Pure ALOHA Slotted ALOHA 0.5-persistent CSMA 1-persistent CSMA 0.01-persistent CSMA Nonpersistent CSMA 0.1-persistent CSMA 0 0 1 2 3 4 5 6 7 8 9 G (attempts per packet time) Chapter 4 p.13/69

CSMA with Collision Detection (CSMA/CD) Early transmission abort Random backoff Bounding the contention interval (2τ, where τ is propagation delay) t o Contention slots Frame Frame Frame Frame Transmission period Contention period Time Idle period Chapter 4 p.14/69

Collision-Free 1-bit reservation 8 Contention slots Frames 8 Contention slots 1 d 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 0 1 2 3 4 5 6 7 1 1 1 1 3 7 1 1 1 5 1 2 issue: 1 bit per station Making the overhead logarithmic Bit time 0 1 2 3 0 0 1 0 0 0 1 0 0 0 1 0 0 1 1 0 0 1 0 1 0 1 0 1 0 Result 1 0 1 0 Stations 0010 and 0100 see this 1 and give up Station 1001 sees this 1 and gives up Chapter 4 p.15/69

Wireless LAN CSMA Hidden station (a C better not send to B) Exposed station (b C could send to D) A B C D A B C D Radio range (a) (b) Chapter 4 p.16/69

Wireless LAN Avoidance RTS / CTS Range of A's transmitter Range of B's transmitter C A RTS B D C A CTS B D E E (a) (b) Chapter 4 p.17/69

Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.18/69

Ethernet Cabling Manchester Encoding MAC Sublayer Protocol Binary Exponential Backoff Performance Switched Ethernet Fast Ethernet Gigabit Ethernet Logical Link Control Retrospective Chapter 4 p.19/69

Ethernet Cabling Common Kinds of Cable 10Base5 vampire taps 10 Mbps, Baseband signaling, 500 meters 10Base2: BNC connectors Name Cable Max seg N/seg Advantages 10Base5 Thick coax 500 m 100 Original; now obsolete 10Base2 Thin coax 185 m 30 No hub 10Base-T Twisted pair 100 m 1024 Cheapest 10Base-F Fiber optics 2000 m 1024 Best between buildings Chapter 4 p.20/69

Ethernet Cabling Illustrating Kinds of Cable Controller Core Controller Transceiver cable Vampire tap Transceiver + controller Twisted pair Transceiver Connector Hub (a) (b) (c) (a) 10Base5, (b) 10Base2, (c) 10Base-T Chapter 4 p.21/69

Ethernet Cabling Cable Topologies A B C A B C D Tap D Repeater Backbone (a) (b) (c) (d) (a) Linear, (b) Spine, (c) Tree, (d) Segmented Chapter 4 p.22/69

Ethernet Manchester Encoding Transition on every bit, clock recovery Basic: 1 is high to low; 0 is low to high Differential: 0 has a transition at the start Requires 2x bandwidth +.85V, -.85V Bit stream 1 0 0 0 0 1 0 1 1 1 1 (a) Binary encoding (b) Manchester encoding (c) Differential Manchester encoding Transition here indicates a 0 Lack of transition here indicates a 1 Chapter 4 p.23/69

Ethernet MAC Sublayer Protocol Frame Formats Bytes 8 6 6 2 0-1500 0-46 4 (a) Preamble Destination address Source address Type Data Pad Check- sum Destination Source (b) Preamble Length Data Pad address address Check- sum (a) DIX (Digital, Intel, Xerox) Ethernet, (b) IEEE 802.3 Chapter 4 p.24/69

Ethernet Frame DIX Preamble: 10101010 (* 8) 10-MHz square wave for 6.4 µsec Destination and Source addresses: 2 or 6 bytes (only 6 is used) Group addresses msb is 1 Broadcast all 1 s Bit 46 is used for local versus global address 48 2 bits for global addresses Types field specifies the upper level protocol Data 1500 byte maximum die to memory costs Pad: to ensure minimum length Checksum: CRC-32 Chapter 4 p.25/69

Ethernet MAC Sublayer Protocol Minimum Frame Size Packet starts Packet almost A B A B at time 0 at B at τ - (a) (b) A B A Noise burst gets back to A at 2τ B (c) Collision at time τ (d) Chapter 4 p.26/69

Ethernet MAC Sublayer Protocol Minimum Frame Size 802.3 longest segment 500 m at most 4 repeaters maximum LAN length is 2500 m Maximum round-trip time is 50µsec 10 Mbps implies 100 nsec / bit, 500 bits takes 50 µsec 802.3 uses 512 bits (64 bytes) as minimum frame size Chapter 4 p.27/69

Ethernet Binary Exponential Backoff Slots are defined to be 51.2µsec during contention period After i collisions, backoff random number of intervals between 0 and 2 i i is bounded at 10 after 16 attempts, the sender quits Intuition Assume that number of contending stations is small until proven otherwise if i were fixed at 1023, lots of unnecessary waiting if i were fixed at 1, potential for unbounded waiting 1 Chapter 4 p.28/69

Ethernet Performance Model Metcalfe and Boggs ignore binary exponential backoff and assume constant probability, p, of retransmission in each slot Probability that one station acquires a slot, A, is A kp 1 p k 1 where k p number of stations ready to transmit probability that a station will retransmit A is maximized when p is 1 k When p is 1 k, A 1 e as k Chapter 4 p.29/69

Ethernet Performance Size of Contention Window, w A A 1 j 1 is the probability that the contention window is j slots Mean number of slots per contention is: j 0 ja 1 Each slot is bounded by 2τ, so the mean window size is bounded by 2τ A Assuming optimal p (p 1 k), A 1 e and w A j 2τe 5 1 4τ 1 A Chapter 4 p.30/69

Ethernet Performance Efficiency Let P be the mean transmission time / frame Channel efficiency Let F B L c frame length bandwidth cable length speed of light P F B P P 2τ A and Channel efficiency As BL increases, efficiency decreases 1 1 2BLe cf Chapter 4 p.31/69

Ethernet Performance Efficiency 1.0 Channel efficiency 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 1024-byte frames 512-byte frames 256-byte frames 128-byte frames 64-byte frames 0 1 2 4 8 16 32 64 128 256 Number of stations trying to send 2τ 51 2µsec, 10 Mbps Chapter 4 p.32/69

Switched Ethernet Connector Switch To hosts Ethernet Hub To hosts To hosts 10Base-T connection To the host computers collision domains Chapter 4 p.33/69

Fast Ethernet Cabling Name Cable Max seg Advantages 100Base-T4 Twisted pair 100 m Category 3 UTP 100Base-TX Twisted pair 100 m full duplex 100 Mbps category 5 100Base-TF Fiber optics 2000 m full duplex 100 Mpbs long runs Chapter 4 p.34/69

Gigabit Ethernet Ethernet Switch or hub Computer Ethernet (a) (b) (a) two-station Ethernet, (b) multistation Ethernet Chapter 4 p.35/69

Gigabit Ethernet It s not Ethernet Full duplex switched, no collisions not CSMA/CD segment length determined by signalling properties Half duplex hubs, collisions 100 times faster, 25 meter maximum length carrier extension hardware pad to 512 bytes (9% efficiency) frame bursting sender sends combined packets up to 512 bytes Chapter 4 p.36/69

Gigabit Ethernet Cabling Name Cable Max seg Advantages 1000Base-SX Fiber optics 550 m Multimode fiber (50, 62.5 microns) 1000Base-LX Fiber optics 5000 m Single (10µ) or multimode (50, 60.5 µ) 1000Base-CX 2 pairs of STP 25 m Shielded twisted pair 1000Base-T 4 pairs of UTP 100 m Standard cat 5 UTP Chapter 4 p.37/69

IEEE 802.2: Logical Link Control Network layer Packet Data link layer LLC MAC MAC LLC LLC Packet Packet MAC Physical layer Network (a) (b) (a) Position of LLC, (b) Protocol formats Chapter 4 p.38/69

Ethernet Retrospective Simple cheap, reliable, and easy to mainain Evolution Chapter 4 p.39/69

Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.40/69

802.11 Protocol Stack Upper layers MAC sublayer Logical link control Data link layer 802.11 Infrared 802.11 FHSS 802.11 DSSS 802.11a OFDM 802.11b HR-DSSS 802.11g OFDM Physical layer Chapter 4 p.41/69

802.11 Physical Layer 802.11a OFDM Othogonal Frequency Division Multiplexing up to 54 Mbps 52 frequencies: 48 for data, 4 for synchronization 802.11b HR-DSSS High Rate Direct Sequence Spread Spectrum 1, 2, 5.5, and 11 Mbps 7 times the range of 802.11a 802.11g (enhanced 802.11b) Chapter 4 p.42/69

802.11 MAC Sublayer Protocol Hidden and Exposed stations Radios are half duplex (can t listen while sending) Modes DCF Distributed Coordination Function PCF Point Coordination Function base station, polls for frames to send beacon frame CSMA/CA Chapter 4 p.43/69

802.11 Hidden and Exposed Stations A wants to send to B but cannot hear that B is busy Range of C's radio B wants to send to C but mistakenly thinks the transmission will fail Range of A's radio A B C A B C C is transmitting A is transmitting (a) (b) Chapter 4 p.44/69

802.11 Virtual Channel Sensing A RTS Data B CTS ACK C NAV D NAV Time Chapter 4 p.45/69

802.11 Fragment Burst Errors are related to fragment length Fragment burst A RTS Frag 1 Frag 2 Frag 3 B CTS ACK ACK ACK C NAV D NAV Time Chapter 4 p.46/69

802.11 Combining PCF and DCF Control frame or next fragment may be sent here SIFS PIFS DIFS PCF frames may be sent here DCF frames may be sent here Bad frame recovery done here EIFS ACK Time Chapter 4 p.47/69

802.11 Protocol Stack Bytes 2 2 6 6 6 2 6 0-2312 4 Frame control Dur- ation Address 1 Address 2 Address 3 Seq. Address 4 Data Check- sum Bits 2 2 4 Version Type Subtype 1 To DS 1 1 1 1 1 1 1 From DS MF Re- try Pwr More W O Frame control Chapter 4 p.48/69

Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless (skip) Bluetooth Data Link Layer Switching Chapter 4 p.49/69

Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth (skip) Data Link Layer Switching Chapter 4 p.50/69

Topics Arbitrating access to broadcast networks Channel Allocation Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth Data Link Layer Switching Chapter 4 p.51/69

Bridging LANs Example Bridge Backbone LAN B B B B File server Cluster on a single LAN Work- station LAN Chapter 4 p.52/69

Bridging LANs Reasons Autonomy: partitioning reflects political boundaries Geography: partitioning reflects geographic distance Load: partition to isolate load Distance: further than 2500 meters Reliability: limit the effect of a bad node Security: limit the spread of sensitive information (promiscuous mode) Chapter 4 p.53/69

Data Link Layer Switching Bridges from 802.x to 802.y Local Internetworking Spanning Tree Bridges Remote Bridges Repeaters, Hubs, Bridges, Switches, Routers, and Gateways Virtual LANs Chapter 4 p.54/69

Bridges from 802.x to 802.y Bridge Function Host A Host B Network Pkt Bridge Pkt LLC Pkt Pkt Pkt MAC 802.11 Pkt 802.11 Pkt 802.3 Pkt 802.3 Pkt Physical 802.11 Pkt 802.11 Pkt 802.3 Pkt 802.3 Pkt 802.11 Wireless LAN Pkt 802.3 Pkt Ethernet Chapter 4 p.55/69

Bridges from 802.x to 802.y Issues Different frame formats Destination Source 802.3 Length Data Pad address address Check- sum Frame Dur- Address Address Address Address 802.11 Seq. Data control ation 1 2 3 4 Check- sum Header 802.16 0 E C Type EK Length Connection ID Data C I CRC Check- sum Different data rates 100 Mbs to 11 Mbps many to one Chapter 4 p.56/69

Bridges from 802.x to 802.y Issues (continued) Different maximum frame sizes frames arrive in one piece or they don t no provision for fragmenting and reassembling frames MTU lacks transparency Security encryption on wireless, but not on Ethernet encrypt at higher layers Quality of service Chapter 4 p.57/69

Local Internetworking Transparent bridging of Local Ethernets F G H Bridge LAN 4 A B B1 C B2 D E LAN 1 LAN 2 LAN 3 For each frame, bridge decides to forward or discard Routing table in each bridge, local knowledge only Backward learning with decay Chapter 4 p.58/69

Spanning Tree Bridges Issue Multiple bridges in parallel Routing loops Frame copied by B1 Frame copied by B2 LAN 2 F 1 F 2 B1 Bridge B2 LAN 1 F Initial frame Build a tree, avoid loops, but ignore some possible links Chapter 4 p.59/69

Spanning Tree Bridges Sample Solution A B C A B C 1 2 3 4 1 2 3 4 LAN D E F LAN D E F G 5 6 7 Bridge H I J Bridge that is part of the spanning tree 5 6 H J 8 9 7 Bridge that is not part of the spanning tree 8 9 (a) (b) Chapter 4 p.60/69

Spanning Tree Bridges Building the Tree Selecting a root node broadcast serial numbers select bridge with lowest serial number Construct a tree with shortest paths from root to every bridge Continue to run algorithm to detect changes in topology Chapter 4 p.61/69

Remote Bridges PPP Links Bridge Point-to-point line LAN 1 LAN 2 LAN 3 MAC frames as payload Strip MAC header and trailer and forward payload only (may miss errors in bridge memory) Chapter 4 p.62/69

Repeaters, Hubs, Bridges, Switches, Routers and Gateways Application layer Transport layer Application gateway Transport gateway Packet (supplied by network layer) Network layer Router Frame header Packet header TCP header User data CRC Data link layer Physical layer Bridge, switch Repeater, hub Frame (built by data link layer) (a) (b) Chapter 4 p.63/69

Hubs, Bridges, and Switches A B C D A B C D Host A B C D Hub Bridge Switch LAN E F G H (a) E F G H (b) E F G H (c) Cutthrough switches Chapter 4 p.64/69

Routers and Gateways Routers operate at the network layer strip off MAC header and trailer use destination address (e.g., IP) address in network header for routing Transport gateways connect networks using different transport protocols (e.g., TCP and ATM) Application gateways, e.g., e-mail to SMS messages Chapter 4 p.65/69

Virtual LANs Physical Topology may not match the logical organization Security, Load, Broadcast Cable duct Hub Corridor Switch Hub Twisted pair to a hub Office Chapter 4 p.66/69

Example VLANs Port versus MAC versus protocol or IP A B C D A B C D G W W W I J K 3 1 4 G GW M I G N J G W B1 B2 S1 S2 GW G GW O K W W W M N O L GW L G 2 E F G H G W G G E F G H (a) (b) Chapter 4 p.67/69

802.1Q Being VLAN Aware Transition VLAN-aware end domain VLAN-aware core domain Legacy end domain Legacy PC Tagged frame Tagged frame VLAN- aware PC VLAN-aware switch Switching done using tags Legacy frame Chapter 4 p.68/69

802.1Q Frame Format Destination Source 802.3 Length Data Pad address address Check- sum Destination Source 802.1Q Tag Length Data Pad address address Check- sum VLAN protocol ID (0x8100) Pri C F I VLAN Identifier Chapter 4 p.69/69