Lecture 9: Bridging & Switching"

Similar documents
CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Some portions courtesy Srini Seshan or David Wetherall

CSE 123A Computer Networks

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel?

Lecture 8: Networks to Internetworks

Lecture 10: Internetworking"

Medium Access Protocols

Summary of MAC protocols

CSE/EE 461 Section 2

CSE 461: Multiple Access Networks. This Lecture

CSE/EE 461 Wireless and Contention-Free Protocols

SWITCHING, FORWARDING, AND ROUTING

Hubs, Bridges, and Switches (oh my) Hubs

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

Principles behind data link layer services

CSE 461: Bridging LANs. Last Topic

ECE 158A: Lecture 13. Fall 2015

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Underlying Technologies -Continued-

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Principles behind data link layer services:

Principles behind data link layer services:

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Internetworking Part 1

1999, Scott F. Midkiff

Integrating Information Systems: Technology, Strategy, and Organizational Factors

CS3600 SYSTEMS AND NETWORKS

Chapter 8 LAN Topologies

Multiple Access Protocols

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

ET4254 Communications and Networking 1

Administrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

The Spanning Tree Protocol

ECE 435 Network Engineering Lecture 21

Local Area Networks (LANs) SMU CSE 5344 /

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

LAN Overview (part 2) Interconnecting LANs - Hubs

ECE 4450:427/527 - Computer Networks Spring 2017

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks.

Review of Topology and Access Techniques / Switching Concepts

Telematics I. Chapter 6 Internetworking. (Acknowledement: These slides have been compiled from H. Karl s set of slides)

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Networking Acronym Smorgasbord: , DVMRP, CBT, WFQ

Media Access Control (MAC) Sub-layer and Ethernet

Lecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions?

Medium Access Control Sublayer Chapter 4

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Ethernet. EE 122: Intro to Communication Networks. Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz

Computer Networks. Wenzhong Li. Nanjing University

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!

CSCI Spring Final Exam Solution

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Lecture 4b. Local Area Networks and Bridges

Chapter 5 Link Layer and LANs

Link Layer Review. CS244A Winter 2008 March 7, 2008 Ben Nham

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline: Connecting Many Computers

Chapter 4 NETWORK HARDWARE

Switching and Forwarding - continued

A B C D E Total / 24 / 23 / 12 / 18 / 3 / 80

Switching and Forwarding - continued

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

HWP2 Application level query routing HWP1 Each peer knows about every other beacon B1 B3

Chapter 6 Connecting Device

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Local Area Network Overview

CH : 15 LOCAL AREA NETWORK OVERVIEW

CS4700/CS5700 Fundamentals of Computer Networks

Bridging and Switching Basics

Network Infrastructure

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Links. CS125 - mylinks 1 1/22/14

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

More on Link Layer. Recap of Last Class. Interconnecting Nodes in LAN (Local-Area Network) Interconnecting with Hubs. Computer Networks 9/21/2009

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

TDT Appendix E Interconnection Networks

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI Computer Networks

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded

Redes de Computadores. Medium Access Control

Transcription:

Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday!

Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also frequently on number of hosts connected Methods to interconnect LANs Repeaters and bridges Switching 2

Contention-free Protocols" Problem with fixed partitioning: Inefficient at low load (idle channels) Problem with contention-based protocols: Inefficient at high load (collisions) Ideal(?): Contention-free protocols Try to do both by explicitly taking turns Can potentially also offer guaranteed bandwidth, latency, etc. 3

Contention-free Approaches" Polling Token Passing Master node invites slave nodes to transmit in turn Control token passed from one node to next sequentially. Request to Send (RTS), Clear to Send (CTS) messages Point-to-point links can be fast Problems: Polling overhead Latency Single point of failure (master) Problems: Token overhead Latency Single point of failure (token) 4

Token Ring (802.5)" D C A B nodes Direction of transmission Token rotates permission to send around node Sender injects packet into ring and removes later Maximum token holding time (THT) bounds access time Early or delayed token release Round robin service, acknowledgments and priorities Monitor nodes ensure health of ring (alerts on failures) 5

FDDI" Roughly a large, fast token ring 100 Mbps and 200 km vs. 4/16 Mbps and local Dual counter-rotating rings for redundancy Complex token holding policies for voice etc. traffic Ring advantages No contention, bounded access delay Support fair, reserved, priority access Disadvantages Complexity, reliability, scalability Break! 6

Why Did Ethernet Win?" Failure modes Token rings network unusable Ethernet node detached Good performance in common case Completely distributed, easy to maintain/administer Easy incremental deployment Volume à lower cost à higher volume. 7

Problems with Busses" One shared link (a bus) limits scale in terms of: Distance (e.g., 2500 m for Ethernet) Number of nodes (1024 nodes) Performance (Capacity shared across all nodes) A better alternative is to have multiple busses Each bus is of a limited size, scale, number of hosts, etc. Need the ability to connect multiple busses together In other words move frames from one wire to another 8

Hubs/Repeaters" Physical layer device One port for each LAN Repeat received bits on one port out all other ports LAN1 Hub LAN2 LAN3 9

Hub Advantages" Hubs can be arranged into hierarchies Ethernet: up to four hubs between any pair of nodes Most of LAN continues to operate if leaf hub dies Simple, cheap 10

Still One Big Bus" Single collision domain No improvement in max throughput Average throughput < as # of nodes increases Why? Still limited in distance and number of hosts Collision detection requirements Synchronization requirements Requires performance homogeneity Can t connect 10 Mbps and 100 Mbps networks 11

Bridges" Store and forward device Data-link layer device Buffers entire packet and then rebroadcasts it on other ports Creates separate collision domains Uses CSMA/CD for access to each LAN (acts like a host) Can accommodate different speed interfaces (issues?) Improves throughput (why?) Can significantly improve performance Not all frames go everywhere. (Why did they with a hub?) 12

Selective Forwarding" Only rebroadcast a frame to the LAN where its destination resides If A sends packet to X, then bridge must forward frame If A sends packet to B, then bridge shouldn t LAN 1 A LAN 2 W B C bridge X Y D Z 13

Forwarding Tables" Need to know destination of frame Destination address in frame header (48bit in Ethernet) Need know which destinations are on which LANs One approach: statically configured by hand» Table, mapping address to output port (i.e. LAN) But we d prefer something automatic and dynamic Simple algorithm: Receive frame f on port q Lookup f.dest for output port If f.dest found then if output port is q then drop /* already delivered */ else forward f on output port; else flood f; /* forward on all ports but the one where frame arrived*/ 14"

Learning Bridges" Eliminate manual configuration by learning which addresses are on which LANs Basic approach If a frame arrives on a port, then associate its source address with that port As each host transmits, the table becomes accurate Expire tables to handle moving nodes Associate a timestamp with each table entry Refresh timestamp for each new packet with same source If entry gets too stale, remove it 15

Learning Example" Suppose C sends frame to D and D replies back with frame to C C sends frame, bridge has no info about D, so floods to both LANs bridge notes that C is on port 1 frame ignored on upper LAN frame received by D 16

Learning Example" D generates reply to C, sends bridge sees frame from D bridge notes that D is on port 2 bridge knows C on port 1, so forwards frame out port 1 17

Network Topology" Linear organization Inter-bridge hubs (e.g. CS) are single points of failure Unnecessary transit (e.g. EE<->SE must traverse CS) Backbone/tree Can survive LAN failure Manages all inter-lan communication Requires more ports 18

An Issue: Cycles" Learning works well in tree topologies A B3 B C B5 But trees are fragile B2 D B7 Net admins like redundant/backup paths E F K B1 How to handle Cycles? Where should B1 forward packets destined for LAN A? G B6 B4 H 19

Spanning Tree" Spanning tree uses subset of bridges so there are no cycles Prune some ports Only one tree C E A B2 B3 D B5 B7 F B K Q: How do we find a spanning tree? Automatically! Elect root, find paths G I B6 B1 B4 H J 20

Spanning Tree Algorithm" Each bridge sends periodic configuration messages (RootID, Distance to Root, BridgeID) All nodes think they are root initially Each bridge updates route/root upon receipt Smaller root address is better, then shorter distance To break ties, bridge with smaller address is better Record best config heard on each port Rebroadcast new config only to ports we re best Don t bother sending config to LANs with better options Add 1 to distance, send new configs where still best Only forward to ports to route or where we re best 21

Spanning Tree Example" Sample messages to and from B3: A 1. B3 sends (B3, 0, B3) to B2 and B5 2. B3 receives (B2, 0, B2) and (B5, 0, B5) and accepts B2 as root 3. B3 sends (B2, 1, B3) to B5 4. B3 receives (B1, 1, B2) and (B1, 1, B5) and accepts B1 as root 5. B3 wants to send (B1, 2, B3 ) but doesn t as its nowhere best 6. B3 receives (B1, 1, B2) and (B1, 1, B5) again and again Data forwarding is turned off for LAN A C E G B2 I B3 B6 D B1 B5 B4 B7 F H J B K 22

For Next Time" Read 3.2-3.2.4 in P&D Homework due Wednesday 23