Applied Networks & Security

Similar documents
Applied Networks & Security

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

EE 122: Ethernet and

Computer Networks Principles LAN - Ethernet

CSMA/CD (Collision Detection)

Medium Access Protocols

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Summary of MAC protocols

Access Technologies! Fabio Martignon

Reminder: Datalink Functions Computer Networking. Datalink Architectures

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ECE 158A: Lecture 13. Fall 2015

6th Slide Set Computer Networks

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Link Layer and Ethernet

Link Layer and Ethernet

Introduction to Networks and the Internet

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

ECE 4450:427/527 - Computer Networks Spring 2017

Principles behind data link layer services

Redes de Computadores. Medium Access Control

Data Link Layer, Part 3 Medium Access Control. Preface

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Networking Technologies and Applications

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Computer Networks and Distributed Systems

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

CMPE 257: Wireless and Mobile Networking

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Chapter 12 Multiple Access 12.1

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Data and Computer Communications. Chapter 11 Local Area Network

Ethernet. Introduction. CSE 3213 Fall 2011

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

More on LANS. LAN Wiring, Interface

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Media Access Control (MAC) Sub-layer and Ethernet

Computer Networks Principles LAN - Ethernet

Aloha and slotted aloha

CSE 461: Multiple Access Networks. This Lecture

Local Area Networks (LANs) SMU CSE 5344 /

Multiple Access. Data Communications and Networking

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

IEEE standards for local area networks

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Telematics I. Chapter 6 Internetworking. (Acknowledement: These slides have been compiled from H. Karl s set of slides)

Data Link Layer, Part 5. Medium Access Control

CS 3516: Advanced Computer Networks

Switching & ARP Week 3

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 15 Networking Fundamentals. Today s Plan

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

COS 140: Foundations of Computer Science

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

CSE 461: Wireless Networks

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

LAN Interconnection and Other Link Layer Protocols

COS 140: Foundations of Computer Science

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Direct Link Communication II: Wired Media. Multi-Access Communication

Computer Networks. Wenzhong Li. Nanjing University

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Unit 7 Media Access Control (MAC)

CPE 548 Exam #1 (50 pts) February 17, 2016

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Chapter 2. Switch Concepts and Configuration. Part I

LAN Overview (part 2) Interconnecting LANs - Hubs

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Principles behind data link layer services:

Principles behind data link layer services:

ICE 1332/0715 Mobile Computing (Summer, 2008)

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

CSC 4900 Computer Networks: Link Layer (2)

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

The MAC layer in wireless networks

LAN PROTOCOLS. Beulah A AP/CSE

The Link Layer and LANs: Ethernet and Swiches

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Data and Computer Communications

Direct Link Communication II: Wired Media. Multi-Access Communication

Applied Networks & Security

Interface The exit interface a packet will take when destined for a specific network.

Introduction to Ethernet. Guy Hutchison 8/30/2006

Ethernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain

Random Assignment Protocols

CSCD 330 Network Programming Spring 2017

Image courtesy Cisco Systems, Inc. Illustration of a Cisco Catalyst switch

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

LAN Systems. Bus topology LANs

Transcription:

Applied Networks & Security Local Area Networks (LANs) http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Winter 2006/2007 John Kristoff - DePaul University 1

Local Area Network (LAN) LAN can be a difficult term to define Generally speaking... Most computers have a LAN link interface Ethernet, by far, most popular link technology Good capacity, measured in Mb/s minimally Most LAN links cover short distances Historically shared medium access Increasingly less true today IT 263 Winter 2006/2007 John Kristoff - DePaul University 2

Cabling demonstration Let's look at and talk about some basic cabling, connectors and installation practices If you're just looking at these slides outside of class with no video, well, you should have been here IT 263 Winter 2006/2007 John Kristoff - DePaul University 3

The data link interface I don't remember where I swiped this diagram from :-( IT 263 Winter 2006/2007 John Kristoff - DePaul University 4

Physical (and logical) topologies diagrams courtesy of http://www.netbook.cs.purdue.edu IT 263 Winter 2006/2007 John Kristoff - DePaul University 5

Ethernet Most popular link technology by far IEEE standardized as IEEE 802.3 Sever generations and updates Mostly same frame format Updates mainly to increase transmission rate Physical layer requirement changes as needed IT 263 Winter 2006/2007 John Kristoff - DePaul University 6

Ethernet transmission diagram courtesy of http://www.netbook.cs.purdue.edu One station successfully transmits at a time Signal propagates the entire cable length (bus) All stations receive all transmissions CSMA/CD medium access control IT 263 Winter 2006/2007 John Kristoff - DePaul University 7

CSMA/CD Carrier sense (CS) Wait until channel is idle, then transmit Multiple access (MA) All stations on channel use same MAC protocol Collision detection (CD) Listen to medium while transmitting Detect if another station transmits simultaneously If collision, enter back-off algorithm IT 263 Winter 2006/2007 John Kristoff - DePaul University 8

We are an Ethernet Through a simple exercise, let's pretend we're part of an Ethernet, how does communication work? If you're just looking at these slides outside of class with no video, well, you should have been here IT 263 Winter 2006/2007 John Kristoff - DePaul University 9

Exponential back-off algorithm Sending station backs-off after collision is detected Let 1 slot time = 512 bit times (64 byte min. frame) Upon 1 st collision, randomly choose {0,1} slot delay Upon 2 nd collision, randomly choose {0,1,2,3} Up to a maximum of 16 retransmission attempts And up to a maximum of 1023 * slot delay time Give up after 16 retransmission attempts Capture effect: brief, unfair advantage for busy sender, in practice a non-problem IT 263 Winter 2006/2007 John Kristoff - DePaul University 10

Collision domain Min length frame must be >= than the maximum round trip time (RTT) of the entire ethernet segment Must hear collision before transmission completes Historically minimum frame was 512 bits (64 bytes) Requires 46 payload bytes, pad if unavailable Cabling distance decreases as speed increases Use of full-duplex removes collision domain restriction IT 263 Winter 2006/2007 John Kristoff - DePaul University 11

Are collisions bad? Collision stats are usually meaningless Unless the collisions are late Or you see them on full-duplex links Collisions are an efficient arbitration scheme Collisions resolved and detected within the round trip time (RTT) of the channel (that is, quickly), stations do not finish their frame transmissions Short answer, no, collisions usually aren't bad IT 263 Winter 2006/2007 John Kristoff - DePaul University 12

Promiscuous mode Interface accepts all frames regardless of destination address Useful for debugging Available on most wired adapters, some wireless chipsets do not support it IT 263 Winter 2006/2007 John Kristoff - DePaul University 13

Ethernet addressing IEEE standard address is 48 bits long Written as 12 hexadecimal digits (e.g. ff:ff:ff:ff:ff:ff:ff) Also known as: Layer 2 address Hardware address MAC address Data link address IT 263 Winter 2006/2007 John Kristoff - DePaul University 14

Visualizing ethernet addresses IT 263 Winter 2006/2007 John Kristoff - DePaul University 15

Why bridge? LANs may have physical distance limitations Limitation on the number of hosts per LAN Allocate more capacity per station Contain traffic to local LAN segment Accommodate hosts with no layer 3 protocol Support any layer 3 protocol Connect dispersed LANs together IT 263 Winter 2006/2007 John Kristoff - DePaul University 16

Visualizing bridges diagrams courtesy of http://www.netbook.cs.purdue.edu IT 263 Winter 2006/2007 John Kristoff - DePaul University 17

Transparent bridging diagram courtesy of http://www.netbook.cs.purdue.edu Bridge listens to each interface promiscuously Bridge inspects layer 2 information Forward frames to other interfaces if necessary IT 263 Winter 2006/2007 John Kristoff - DePaul University 18

Bridge forwarding and filtering Receive a frame on an ingress interface Inspect destination address If multicast/broadcast, forward to all except incoming (ingress) interface Query address table (cache) for destination address If found, forward out (egress) associated port Except when ingress = egress, just drop it If not found, flood to all interfaces except the incoming (ingress) interface IT 263 Winter 2006/2007 John Kristoff - DePaul University 19

Source address learning Bridge listens promiscuously on all interfaces Store source address and associated ingress interface port in address table (cache) IT 263 Winter 2006/2007 John Kristoff - DePaul University 20

Bridge table (cache) entry aging Low-priority or non-time critical operation Allows station mobility and small table size Aging process periodically clears the H bit If H bit is clear, clear the V bit If H and V bits are clear, remove the table entry IT 263 Winter 2006/2007 John Kristoff - DePaul University 21

We are bridges and Ethernets Through a simple exercise, we demonstrate how bridges and Ethernets operate If you're just looking at these slides outside of class with no video, well, you should have been here IT 263 Winter 2006/2007 John Kristoff - DePaul University 22

LAN switches LAN switches = LAN bridges Switches imply newer, better, faster, bigger, etc. Switching is a successful marketing term Often used to further segment shared LANs Switch port per device/customer becoming the norm Most LAN switches are relatively simple and cheap IT 263 Winter 2006/2007 John Kristoff - DePaul University 23

Why switch? Reduce/remove shared medium contention Maximize aggregate capacity Extend distance limitations Data rate flexibility IT 263 Winter 2006/2007 John Kristoff - DePaul University 24

Visualizing LAN switches IT 263 Winter 2006/2007 John Kristoff - DePaul University 25

Store and forward switching Completely receive frame on ingress port Check frame check sequence (FCS) for validity Perform address learning Make forwarding/filtering decision IT 263 Winter 2006/2007 John Kristoff - DePaul University 26

Cut-through switching Begin making forwarding decision as soon as you get the destination address (do not wait for the entire frame) Goal is to improve switch latency More successful marketing IT 263 Winter 2006/2007 John Kristoff - DePaul University 27

Cut-through switching fallacies Latency only improves if outgoing (egress) port is free, this is not when you need the improvement Switch latency is the least of your problems Multicast/broadcast cut-through too? Input (ingress) and output (egress) port rate must match Propagates errors (but generally not a problem) Store-and-forward is usually the default (good choice) IT 263 Winter 2006/2007 John Kristoff - DePaul University 28

LAN switch configurations Bounded/stand-alone Stack-able Chassis IT 263 Winter 2006/2007 John Kristoff - DePaul University 29

Wireless by way of example In the sake of time, I'll just describe the wireless LAN system we originally setup at DePaul here See http://ntgrd.depaul.edu/rfcs/dpunet-rfc6.txt IT 263 Winter 2006/2007 John Kristoff - DePaul University 30