Computer Networks Principles LAN - Ethernet

Similar documents
Computer Networks Principles LAN - Ethernet

Broadcast Links, Addressing and Media Access Control. Link Layer B. Link and Physical Layers. MAC Addresses

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

VLAN and bridges. Transparent Bridging (TB) Transparent Bridging (TB) LB: Learning Bridge. Several Learning Bridges. Loops. Loop-Free topology

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

The MAC Layer. Contents. Textbook. Jean Yves Le Boudec Fall 2012

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

EE 122: Ethernet and

Announcements. CS 5565 Network Architecture and Protocols. Ethernet. Ethernet. Ethernet Model. Ideal Multiple Access Protocol

Contents. The MAC layer CN2. 1. MAC as Shared Medium 2. MAC as interconnection at small scale 3. MAC and Link layer. Jean-Yves Le Boudec, EPFL

Advanced Computer Networks

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

The Link Layer and LANs: Ethernet and Swiches

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

The MAC Layer. Clicker registration

Link Layer and Ethernet

Link Layer and Ethernet

CN2 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. The MAC layer. Jean-Yves Le Boudec Fall Jean-Yves Le Boudec, EPFL

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Link Layer: Introduction. Chapter 5 Link Layer & LANS. Link layer: context. Link Layer Services

Networking Technologies and Applications

Summary of MAC protocols

Unit 8. Spanning Tree protocol, Virtual LANs (VLANs) and Access Networks

Redes de Computadores. Medium Access Control

Principles behind data link layer services

CCM 4300 Lecture 6 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Data and Computer Communications. Chapter 11 Local Area Network

Medium Access Protocols

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

ISO/OSI Model and Collision Domain NETWORK INFRASTRUCTURES NETKIT - LECTURE 1 MANUEL CAMPO, MARCO SPAZIANI

LAN PROTOCOLS. Beulah A AP/CSE

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

The MAC Layer. Jean Yves Le Boudec 2015

The MAC Layer. Jean Yves Le Boudec 2015

Local Area Network Overview

Session Exam 1. EG/ES 3567 Worked Solutions. (revised)

Discussions. What are the main service. Ch06 Link Layer. The Data Link Layer. Link Layer. Link Layer: Teminology. What are the services

Chapter 5 Link Layer and LANs

The MAC Layer. Mukhopadhyay. Jean Yves Le Boudec 2017

CSE/EE 461 Section 2

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Principles behind data link layer services:

Principles behind data link layer services:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Part3. Local Area Networks (LAN)

ET4254 Communications and Networking 1

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

CSE 461: Multiple Access Networks. This Lecture

Reminder: Datalink Functions Computer Networking. Datalink Architectures

The MAC Layer. Mukhopadhyay. Jean Yves Le Boudec 2018

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Applied Networks & Security

Applied Networks & Security

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Introduction to LAN Protocols

Lecture 4b. Local Area Networks and Bridges

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Master Course Computer Networks IN2097

CH : 15 LOCAL AREA NETWORK OVERVIEW

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Ethernet. EE 122: Intro to Communication Networks. Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes

Chapter 11 in Stallings 10 th Edition

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Chapter 5 Link Layer and LANs

CS 455/555 Intro to Networks and Communications. Link Layer

Chapter 2. Switch Concepts and Configuration. Part I

LAN Local Area Networks. CSMA/CD restriction. Bits on the Wire. PacketSize 2 * COMP476 Networked Computer Systems. Interconnecting

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

The Link Layer II: Ethernet

Introduction to LAN Protocols

Link layer, LANs: outline. Chapter 5-2 Link Layer. MAC addresses (more) MAC addresses

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

IEEE standards for local area networks

Computer Networks Principles

Data Link Layer: Multi Access Protocols

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Module 10 Data Link Layer CS655! 10-1!

Access Technologies! Fabio Martignon

Chapter 6: Network Communications and Protocols

Chapter 5: Link layer

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub

Local Area Networks (LANs) SMU CSE 5344 /

Multiple Access Links and Protocols

Local Area Networks. Ethernet LAN

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Chapter 5: The Data Link Layer. Chapter 5 Link Layer and LANs. Ethernet. Link Layer. Star topology. Ethernet Frame Structure.

Raj Jain. The Ohio State University Columbus, OH

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Link Layer and LANs. Our Goals. Link Layer

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Transcription:

Computer s Principles LN - thernet Prof. ndrzej Duda duda@imag.fr Interconnection structure - layer subnetwork interconnection layer interconnection layer subnet subnet router switch (bridge) VLN http://duda.imag.fr Interconnection structure - layer Interconnection at layer interconnection layer switch (bridge) VLN Switches (bridges) interconnect s logically separate groups of s (VLNs) managed by one entity ype of the network broadcast Forwarding based on address flat address space forwarding tables: one entry per works if no loops careful management Spanning ree protocol not scalable Protocol architecture I 80. - thernet pplication ransport L PDU ( Frame) L PDU ( Frame) transceiver switch (bridge) Switches are layer intermediate systems ransparent forwarding Management protocols (Spanning ree, VLN) repeater terminator 6

Random ccess protocols When node has packet to send transmit at full channel data rate R. no a priori coordination among nodes two or more transmitting nodes -> collision, random access protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions) xamples of random access protocols: LOH, slotted LOH CSM, CSM/CD (thernet), CSM/C (80.) CSM/CD (Collision Detection) CSM/CD (Carrier Sense Multiple ccess/ Collision Detection) carrier sensing, deferral if ongoing transmission collisions detected within short time colliding transmissions aborted, reducing channel wastage persistent transmission collision detection: easy in wired LNs: measure signal strengths, compare transmitted, received signals difficult in wireless LNs: receiver shut off while transmitting 7 8 CSM/CD algorithm CSM / CD Collision i = while (i <= maxttempts) do listen until channel is idle transmit and listen wait until (end of transmission) or (collision detected) if collision detected then stop transmitting, send jam bits ( bits) else wait for interframe delay (9.6!s) leave wait random time increment i end do 9 senses idle channel, starts transmitting shortly before, senses idle channel, starts transmitting 0 0 CSM / CD Jam Signal Random retransmission interval senses collision, continues to transmit the jam signal (-bit) senses collision, continues to transmit the jam signal 0 t r = random (0, k -) k = min (0, ttemptnb) slot time =. µs st collision, r = 0, nd collision, r = 0,,, 0 th, r = 0,,, 0 th, stop

CSM / CD Retransmission Retransmission interval waits random time t waits random time t=slottime < t =*slottime senses channel idle and transmits senses channel busy and defers to now waits until channel is idle 0 t t Round trip time Slot limits the interval during which collisions may occur µs +. µs <. µs ( bits) channel is acquired after. µs non-valid frames (results of collisions) < bits minimal frame size (data field 6 bytes) unit of the retransmission interval Frame format (thernet v.) ddressing preamble dest source type data CRC 8 bytes 6 bytes 6 bytes bytes 6-00 bytes bytes Preamble synchronization : 0000.000 ddresses unique, unicast and multicast (starts with the first bit ) broadcast: ype upper layer protocol (IP, IPX, RP, etc.) address: 8 bits = adapter identifier sender puts destination address in the frame all stations read all frames; keep only if destination address matches all address (FF:FF:FF:FF:FF:FF) = broadcast address 08:00:0:7:0d:d C D 00:00:c0:f:6c:a 0:00:e:0:a6:cf (group address) 6 ddressing Data on thernet is transmitted least significant bit of first byte first (a bug dictated by Intel processors) Canonical representation thus inverts the order of bits inside a byte (the first bit of the address is the least significant bit of the first byte) examples of addresses: 0:00:e:0:a6:cf (a group address) 08:00:0:7:0d:d (a SUN machine) 00:00:c0:f:6c:a (a PC ) 00:00:0c:0:78:6 (a CISCO router) FF:FF:FF:FF:FF:FF the broadcast address s Function of a simple, port repeater: repeat bits received on one port to other port if collision sensed on one port, repeat random bits on other port One network with repeaters = one collision domain s perform only physical layer functions (bit repeaters) 7 8

From s to Hubs Multiport repeater (n ports), logically equivalent to: n simple repeater connected to one internal thernet segment Multi-port repeaters make it possible to use point-to-point segments (thernet in the box) ease of management fault isolation Multiport S S S thernet Hub UP segment Multiport 0 S Hubs ree topology (star) (répéteur multiport) max. s to other 9 0 ridges port ridge D port port ridges are intermediate systems, or switches, that forward frames to destinations based on addresses ransparent bridges: learn the Forwarding able C Forwarding able Dest Port Nb addr C D ransparent ridging () ridges are intermediate systems that forward frames to destinations based on addresses Interconnect systems beyond one LN segment, keeping main characteristics of LN without additional addresses addresses used to identify end systems nd systems ignore that there are transparent bridges bridge is transparent frames not changed by bridges frames not sent to bridge, but rather: bridge is promiscuous listens to all frames and retransmits if needed Collision domains s and ridges in OSI Model bridge to 7 pplication Presentation Session pplication Presentation Session to 7 ridges separate collision domains a bridged LN maybe much larger than a repeated LN there may be several frames transmitted in parallel in a bridged LN ransport L PDU ( Frame) L PDU ( Frame) ridges are layer intermediate systems ransport nd System /Hub ridge nd System s are in layer intermediate systems Routers are layer intermediate systems (IP routers)

Protocol architecture Switched thernet Switched thernet = bridge in the box pplication ransport L PDU (IP packet) pplication ransport otal bandwidth is not shared parallel frame transmission Half and full-duplex operation L PDU ( Frame) switch (bridge) L PDU ( Frame) router ridge ridge Routers are layer intermediate systems xplicit forwarding has to know the address of the first router Management protocols (control, routing, configuration) C D U V W X 6 Switching Store and forward receive full frame, check if valid, retransmit 0 µs delay for a 6 bytes frame Cut through address read, retransmit at line speed bytes read and decision made on output link if link busy, defaults to store and forward 0 µs delay for a 6 bytes frame transmission of non-valid frames CRC check at end of forwarding Flow control back pressure using false collision notification on full duplex links, send PUS to s VLN - Virtual LN Keep the advantages of Layer interconnection auto-configuration (addresses, topology - Spanning ree) performance of switching nhance with functionalities of Layer extensibility spanning large distances traffic filtering Limit broadcast domains Security separate subnetworks C D VLN ridge/switch VLN 7 8 Virtual LNs 80.Q No traffic between different VLNs VLNs build on bridges or switches VLN trunk D S data D S t tag data ridge/switch trunk ridge/switch 80. frame 80./P frame Frame encapsulation extension for assigning frame priority and VLN tag C D VLN VLN X Y Z U VLN VLN t - bytes of PI (ag Protocol Identifier): 0x800 tag - bytes of CI (ag Control Information): priority ( bits), VLN Id ( bits) (VID 0x00 often reserved for management) max length = bytes 9 0

agged VLNs VLN table VLN tag ports untagged,, tagged untagged, tagged C VLN VLN SWICH 6 trame non taguée interface physique IP em0 D trame taguée VLN em0 em0. interface IP em0. virtuelle Summary Original thernet is a shared medium: one collision domain per LN ridges are connectionless intermediate systems that interconnect LNs Using bridging, we can have several collision domains per LN thernet switches use bridging State of the art switched 00 Mb/s thernet to the Gb thernet between switches Wireless LNs become increasingly popular WiFi, luetooth