Medium Access Protocols

Similar documents
Summary of MAC protocols

Principles behind data link layer services

Principles behind data link layer services:

Principles behind data link layer services:

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

CSC 4900 Computer Networks: Link Layer (2)

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Chapter 5 Link Layer and LANs

EE 122: Ethernet and

Principles behind data link layer services:

Hubs, Bridges, and Switches (oh my) Hubs

The Link Layer and LANs: Ethernet and Swiches

Underlying Technologies -Continued-

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

CS 455/555 Intro to Networks and Communications. Link Layer Addressing, Ethernet, and a Day in the Life of a Web Request

Chapter 5 part 2 LINK LAYER. Computer Networks Timothy Roscoe Summer Networks & Operating Systems Computer Networks

Chapter 4. DataLink Layer. Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007.

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18

Chapter 5 Link Layer and LANs

CS 3516: Advanced Computer Networks

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Master Course Computer Networks IN2097

Link Layer and LANs. Our Goals. Link Layer

The Link Layer II: Ethernet

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Chapter 5: The Data Link Layer. Chapter 5 Link Layer and LANs. Ethernet. Link Layer. Star topology. Ethernet Frame Structure.

Link Layer and Ethernet

Link layer: introduction

Chapter 5: DataLink Layer

Link Layer and Ethernet

Chapter V: Link Layer

CSCD 330 Network Programming Spring 2017

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks.

Master Course Computer Networks IN2097

LAN Interconnection and Other Link Layer Protocols

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Some portions courtesy Srini Seshan or David Wetherall

Announcements. CS 5565 Network Architecture and Protocols. Ethernet. Ethernet. Ethernet Model. Ideal Multiple Access Protocol

Lecture 4b. Local Area Networks and Bridges

Chapter 5 Data Link Layer

Chapter V: Link Layer

LAN PROTOCOLS. Beulah A AP/CSE

Lecture 9: Bridging & Switching"

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Data Link Layer, Part 3 Medium Access Control. Preface

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

CSE 123A Computer Networks

CSCD 330 Network Programming Winter 2016

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Chapter 5 Data Link Layer

Module 10 Data Link Layer CS655! 10-1!

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Introduction to Networks and the Internet

Data Link Layer, Part 5. Medium Access Control

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Redes de Computadores. Medium Access Control

More on Link Layer. Recap of Last Class. Interconnecting Nodes in LAN (Local-Area Network) Interconnecting with Hubs. Computer Networks 9/21/2009

The Link Layer and LANs. Chapter 6: Link layer and LANs

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

CC451 Computer Networks

Chapter 5 Link Layer. Down Approach. Computer Networking: A Top. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Hubs. Interconnecting LANs. Q: Why not just one big LAN?

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Link layer, LANs: outline. Chapter 5-2 Link Layer. MAC addresses (more) MAC addresses

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

CSC 8560 Computer Networks: Link Layer

Computer Networks Principles LAN - Ethernet

Link Layer and LANs. CMPS 4750/6750: Computer Networks

Computer Networks. Wenzhong Li. Nanjing University

Chapter 6 The Link Layer and LANs

Broadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses

Local Area Network Overview

ECE 158A: Lecture 13. Fall 2015

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Outline: Connecting Many Computers

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Medium Access Control

Chapter 5: The Data Link Layer

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Transcription:

Medium Access Protocols

Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning (dynamic), ALOHA, S-ALOHA, CSMA, CSMA/CD carrier sensing: easy in some technologies (wire), hard in others (wireless) CSMA/CD used in Ethernet Taking Turns polling from a central cite, token passing

LAN technologies Data link layer so far: services, error detection/correction, multiple access Next: LAN technologies addressing Ethernet hubs, bridges, switches 802.11 PPP ATM

LAN Addresses and ARP 32-bit IP address: network-layer address used to get datagram to destination network LAN (or MAC or physical) address: used to get datagram from one interface to another physically-connected interface (same network) 48 bit MAC address (for most LANs) burned in the adapter ROM

LAN Addresses and ARP Each adapter on LAN has unique LAN address

LAN Address (more) MAC address allocation administered by IEEE manufacturer buys portion of MAC address space (to assure uniqueness) Analogy: (a) MAC address: like Social Security Number (b) IP address: like postal address MAC flat address => portability can move LAN card from one LAN to another IP hierarchical address NOT portable depends on network to which one attaches

Address Resolution Protocol (ARP) ARP Query What is the Ethernet Address of 130.245.20.2 Ethernet IP Source IP: 130.245.20.1 Ethernet: 0A:03:21:60:09:FA ARP Response 0A:03:23:65:09:FB IP Destination IP: 130.245.20.2 Ethernet: 0A:03:23:65:09:FB Maps IP addresses to Ethernet Addresses ARP responses are cached

ARP protocol A knows B's IP address, wants to learn physical address of B A broadcasts ARP query pkt, containing B's IP address all machines on LAN receive ARP query B receives ARP packet, replies to A with its (B's) physical layer address A caches (saves) IP-to-physical address pairs until information becomes old (times out) soft state: information that times out (goes away) unless refreshed

Ethernet dominant LAN technology: cheap $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token ring LANs and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Ethernet sketch

Ethernet Frame Structure Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame Preamble: 7 bytes with pattern 10101010 followed by one byte with pattern 10101011 used to synchronize receiver, sender clock rates

Ethernet Frame Structure (more) Addresses: 6 bytes, frame is received by all adapters on a LAN and dropped if address does not match Type/length: indicates the higher layer protocol, mostly IP but others may be supported such as Novell IPX and AppleTalk) CRC: checked at receiver, if error is detected, the frame is simply dropped

Ethernet: uses CSMA/CD A: sense channel, if idle then { transmit and monitor the channel; If detect another transmission then { abort and send jam signal; update # collisions; delay as required by exponential backoff algorithm; goto A } else {done with the frame; set collisions to zero} } else {wait until ongoing transmission is over and goto A}

Ethernet s CSMA/CD (more) Jam Signal: make sure all other transmitters are aware of collision; 48 bits; Exponential Backoff: Goal: adapt retransmission attempts to estimated current load heavy load: random wait will be longer first collision: choose K from {0,1}; delay is K x 512 bit transmission times after second collision: choose K from {0,1,2,3} after ten or more collisions, choose K from {0,1,2,3,4,,1023}

Ethernet Technologies: 10Base2 10: 10Mbps; 2: under 200 meters max cable length thin coaxial cable in a bus topology repeaters used to connect up to multiple segments repeater repeats bits it hears on one interface to its other interfaces: physical layer device only!

10BaseT and 100BaseT 10/100 Mbps rate; latter called fast ethernet T stands for Twisted Pair Hub to which nodes are connected by twisted pair, thus star topology CSMA/CD implemented at hub

10BaseT and 100BaseT (more) Max distance from node to Hub is 100 meters Hub can disconnect jabbering adapter Hub can gather monitoring information, statistics for display to LAN administrators

Gbit Ethernet use standard Ethernet frame format allows for point-to-point links and shared broadcast channels in shared mode, CSMA/CD is used; short distances between nodes to be efficient uses hubs, called Buffered Distributors Full-Duplex at 1 Gbps for point-to-point links

Token Passing: IEEE802.5 standard 4 Mbps max token holding time: 10 ms, limiting frame length SD, ED mark start, end of packet AC: access control byte: token bit: value 0 means token can be seized, value 1 means data follows FC priority bits: priority of packet reservation bits: station can write these bits to prevent stations with lower priority packet from seizing token after token becomes free

Token Passing: IEEE802.5 standard FC: frame control used for monitoring and maintenance source, destination address: 48 bit physical address, as in Ethernet data: packet from network layer checksum: CRC FS: frame status: set by dest., read by sender set to indicate destination up, frame copied OK from ring DLC-level ACKing

Interconnecting LANs Q: Why not just one big LAN? Limited amount of supportable traffic: on single LAN, all stations must share bandwidth limited length: 802.3 specifies maximum cable length large collision domain (can collide with many stations) limited number of stations: 802.5 have token passing delays at each station

Hubs Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces Hubs can be arranged in a hierarchy (or multi-tier design), with backbone hub at its top

Hubs (more) Each connected LAN referred to as LAN segment Hubs do not isolate collision domains: node may collide with any node residing at any segment in LAN Hub Advantages: simple, inexpensive device Multi-tier provides graceful degradation: portions of the LAN continue to operate if one hub malfunctions extends maximum distance between node pairs (100m per Hub)

Hub limitations single collision domain results in no increase in max throughput multi-tier throughput same as single segment throughput individual LAN restrictions pose limits on number of nodes in same collision domain and on total allowed geographical coverage cannot connect different Ethernet types (e.g., 10BaseT and 100baseT)

Bridges Link Layer devices: operate on Ethernet frames, examining frame header and selectively forwarding frame based on its destination Bridge isolates collision domains since it buffers frames When frame is to be forwarded on segment, bridge uses CSMA/CD to access segment and transmit

Bridges (more) Bridge advantages: Isolates collision domains resulting in higher total max throughput, and does not limit the number of nodes nor geographical coverage Can connect different type Ethernet since it is a store and forward device Transparent: no need for any change to hosts LAN adapters

Bridges: frame filtering, forwarding bridges filter packets same-lan -segment frames not forwarded onto other LAN segments forwarding: how to know which LAN segment on which to forward frame? looks like a routing problem (more shortly!)

Backbone Bridge

Interconnection Without Backbone Not recommended for two reasons: - single point of failure at Computer Science hub - all traffic between EE and SE must path over CS segment

Bridge Filtering bridges learn which hosts can be reached through which interfaces: maintain filtering tables when frame received, bridge learns location of sender: incoming LAN segment records sender location in filtering table filtering table entry: (Node LAN Address, Bridge Interface, Time Stamp) stale entries in Filtering Table dropped (TTL can be 60 minutes)

Bridge Filtering filtering procedure: if destination is on LAN on which frame was received then drop the frame else { lookup filtering table if entry found for destination then forward the frame on interface indicated; else flood; /* forward on all but the interface on which the frame arrived*/ }

Bridge Learning: example Suppose C sends frame to D and D replies back with frame to C C sends frame, bridge has no info about D, so floods to both LANs bridge notes that C is on port 1 frame ignored on upper LAN frame received by D

Bridge Learning: example D generates reply to C, sends bridge sees frame from D bridge notes that D is on interface 2 bridge knows C on interface 1, so selectively forwards frame out via interface 1

Spanning Tree The learning bridge fails when the network topology has a loop. Why? Loops are not necessarily bad. They provide redundancy that can be used to recover from failures To handle loops, bridges implement the spanning tree algorithm. The spanning tree algorithm imposes a logical tree over the physical topology Data is only transferred along links that belong to the spanning tree

Spanning Tree Algorithm Each bridge has unique id (e.g., B1, B2, B3) Select bridge with smallest id as root Select bridge on each LAN closest to root as designated bridge (use id to break ties) Each bridge forwards frames over each LAN for which it is the designated bridge A C B3 B5 B E B2 D B7 F K B1 G H I B6 B4 J

Spanning Tree Algorithm (contd.) Bridges exchange configuration messages called CBPDU s(configuration Bridge Protocol Data Unit) id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge Each bridge records the current best configuration message for each port Initially, each bridge believes it is the root

Spanning Tree Algorithm (contd.) When a bridge learns that it is not the root it stops generating configuration messages in steady state, only root generates configuration messages When the bridge learns that it is not the designated bridge, it stops forwarding configuration messages in steady state, only designated bridges forward config messages Root continues to periodically send config messages If any bridge does not receive successive config messages, it starts generating config messages claiming to be the root This is used to recover from root failure

Limitations of Bridges Do not scale spanning tree algorithm does not scale single large broadcast domains do not scale Do not accommodate heterogeneity Bridges support ethernet to ethernet, ethernet to 802.5 and 802.5 to 802.5. Caution: beware of transparency Applications that assume that they are executing on a single LAN will fail. Latency increases in large LANs, so does jitter

WWF Bridges vs. Routers both store-and-forward devices routers: network layer devices (examine network layer headers) bridges are Link Layer devices routers maintain routing tables, implement routing algorithms bridges maintain filtering tables, implement filtering, learning and spanning tree algorithms

Routers vs. Bridges Bridges + and - + Bridge operation is simpler requiring less processing bandwidth - Topologies are restricted with bridges: a spanning tree must be built to avoid cycles - Bridges do not offer protection from broadcast storms (endless broadcasting by a host will be forwarded by a bridge)

Routers vs. Bridges Routers + and - + arbitrary topologies can be supported, cycling is limited by TTL counters (and good routing protocols) + provide firewall protection against broadcast storms - require IP address configuration (not plug and play) - require higher processing bandwidth bridges do well in small (few hundred hosts) while routers used in large networks (thousands of hosts)