Packet Switching Techniques

Similar documents
Switching and Forwarding - continued

HWP2 Application level query routing HWP1 Each peer knows about every other beacon B1 B3

Switching and Forwarding - continued

Packet Switching. Hongwei Zhang Nature seems to reach her ends by long circuitous routes.

Switching and Forwarding

Research paper Measured Capacity of an Ethernet: Myths and Reality

Cell Switching (ATM) Commonly transmitted over SONET other physical layers possible. Variable vs Fixed-Length Packets

Switching and Forwarding

Administrivia. Homework on class webpage If you are having problems following me in class (or doing the homework problems), please buy the textbook

Internetworking Part 1

Packet Switching. Guevara Noubir Fundamentals of Computer Networks. Computer Networks: A Systems Approach, L. Peterson, B. Davie, Morgan Kaufmann

Medium Access Protocols

Packet Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction

Chapter 10. Circuits Switching and Packet Switching 10-1

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Lecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions?

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

ATM. Asynchronous Transfer Mode. these slides are based on USP ATM slides from Tereza Carvalho. ATM Networks Outline

Asynchronous Transfer Mode

Master Course Computer Networks IN2097

Summary of MAC protocols

Principles behind data link layer services

Communication Networks

Ch. 4 - WAN, Wide Area Networks

Chapter 3 Packet Switching

Principles behind data link layer services:

Principles behind data link layer services:

Bandwidth-on-Demand up to very high speeds. Variety of physical layers using optical fibre, copper, wireless. 3BA33 D.Lewis

Asynchronous Transfer Mode (ATM) ATM concepts

BROADBAND AND HIGH SPEED NETWORKS

Underlying Technologies -Continued-

CSCI Computer Networks

11. Traffic management in ATM. lect11.ppt S Introduction to Teletraffic Theory Spring 2003

Asynchronous Transfer Mode (ATM) Broadband ISDN (B-ISDN)

ATM Logical Connections: VCC. ATM Logical Connections: VPC

! Cell streams relating to different media types are multiplexed together on a statistical basis for transmission and switching.

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Wireless Networks. Communication Networks

Cell Format. Housekeeping. Segmentation and Reassembly AAL 3/4

11. Traffic management in ATM

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Ethernet Switches (more)

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Hubs. Interconnecting LANs. Q: Why not just one big LAN?

Module 10 Frame Relay and ATM

ATM in TCP/IP environment: Adaptations and Effectiveness

Chapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1

Adaptation Problems and Solutions. MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997

Distributed Queue Dual Bus

WAN Technologies (to interconnect IP routers) Mario Baldi

ATM Technology in Detail. Objectives. Presentation Outline

A T M. Cell Switched Technology. not SMDS. Defacto Standard Multimedia capable Use with SONET or SDH. Fixed Length - 53 bytes. DigiPoints Volume 1

CPEG 514. Lecture 11 Asynchronous Transfer Mode (ATM) CPEG 514

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Outline. Circuit Switching. Circuit Switching : Introduction to Telecommunication Networks Lectures 13: Virtual Things

Module 10 Frame Relay and ATM

IP over ATM. IP over ATM. Agenda. IP over ATM : Solving the Problem I.

Chapter 6 Connecting Device

Lecture 22 Overview. Last Lecture. This Lecture. Next Lecture. Internet Applications. ADSL, ATM Source: chapter 14

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

Figure 10.1 Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing.

Protocol Architecture (diag) Computer Networks. ATM Connection Relationships. ATM Logical Connections

Chapter 1 Introduction

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Local Area Network Overview

William Stallings Data and Computer Communications 7 th Edition. Chapter 11 Asynchronous Transfer Mode

This Lecture. BUS Computer Facilities Network Management X.25. X.25 Packet Switch. Wide Area Network (WAN) Technologies. X.

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy)

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Wide area networks: packet switching and congestion

Asynchronous_Transfer_Mode_Switching

Asynchronous. nous Transfer Mode. Networks: ATM 1

Introducing Campus Networks

1997, Scott F. Midkiff 1

Reminder: Datalink Functions Computer Networking. Datalink Architectures

ST.MOTHER THERESA ENGINEERING COLLEGE

Computer Facilities and Network Management BUS3150 Tutorial - Week 13

Avaya. User s Guide M-ACCF/SF MODULE AVAYA M770 MULTIFUNCTION SWITCH

CH : 15 LOCAL AREA NETWORK OVERVIEW

NETWORK PARADIGMS. Bandwidth (Mbps) ATM LANS Gigabit Ethernet ATM. Voice, Image, Video, Data. Fast Ethernet FDDI SMDS (DQDB)

ET4254 Communications and Networking 1

DigiPoints Volume 1. Leader Guide. Module 12 Asynchronous Transfer Mode. Summary. Outcomes. Objectives. Prerequisites

Copyright 2010, Elsevier Inc. All rights Reserved

ECE 4450:427/527 - Computer Networks Spring 2017

Advanced Internet Technologies

Chapter 8 LAN Topologies

More on LANS. LAN Wiring, Interface

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Module 3. Wide Area Networking (WAN)

BROADBAND AND HIGH SPEED NETWORKS

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

LAN Interconnection and Other Link Layer Protocols

Good day. Today we will be talking about Local Internetworking What is Internetworking? Internetworking is the connection of different networks.

Hubs, Bridges, and Switches (oh my) Hubs

PRACTICES FNC Guide to ATM GUIDE TO ATM CROSS PRODUCT DOCUMENTATION ISSUE 1, JANUARY 2002 FUJITSU NETWORK COMMUNICATIONS, INC.

Introduction to LAN Protocols

ITU-T I.150. B-ISDN asynchronous transfer mode functional characteristics

ATM networks. C. Pham Université de Pau et des Pays de l Adour LIUPPA Laboratory

Transcription:

Packet Switching Techniques 188lecture3.ppt Pasi Lassila 1 Problem Aim: Build larger networks connecting more users also spanning different network technologies Shared media networks limited number of stations that can be connected limited geographical coverage Solution: switched networks review general switching technologies extending LANs through LAN switches (bridges, Ethernet switches) 2

Outline General switching techniques Bridges and LAN switches ATM technology ATM in LAN 3 Scalable networks Switch provides star topology forwards (switches) packets from input port to output port ports terminate link layer protocols (T1, T3, STM-n) port selected based on address in packet header T3 T3 Switch T3 T3 STM-1 STM-1 Input ports Output ports Advantages can cover large geographic area (tolerate latency) can support large numbers of hosts (scalable bandwidth) in Ethernet adding new hosts decreases bandwidth available to users 4

Switching methods and addressing Switching/forwarding systematic process of determining to which output port a packet is sent based on packet s header different techniques to achieve this source routing model connectionless (datagram) model connection oriented (virtual circuit) model Requires method to identify end hosts done by using addressing here it is assumed hosts have globally unique addresses (telephone number, Ethernet) in Internet addresses can be reused (discussed in lectures on routing) 5 Source routing 3 0 Switch 1 1 2 3 0 1 1 3 0 3 2 0 Switch 2 1 3 0 2 1 ost A Every packet contains full path information headers of variable length nodes must have all topology information (not scalable) Source routing can be used in Internet 0 1 3 0 Switch 3 1 3 ost B 2 6

Datagram switching Each packet contains complete destination address Analogy: postal system No notion of connections network does not store any state ost C 3 ost D 2 0 B Switch 1 1 ost E 2 Switch 2 3 1 B 0 ost F Switches (routers) maintain routing tables packets routed independently constructing routing tables difficult for complex networks ost A ost G 1 B 0 Switch 3 3 2 B ost B ost 7 Virtual circuit (VC) switching Connection setup phase before 0 Switch 1 information transfer 3 1 VCs can be 2 permanent (nw mgmt) on-demand (signaling) Connection set up (on-demand) ost A along forward path, each switch decides VC identifier (VCI) and forwards request along reverse path, nodes inform upstream nodes of chosen VCI values VCIs local identifiers, may change from link to link switches maintain VCI tables and store connection state Information transfer subsequent packets follow same path Connection tear down after transfer over Analogy: telephone call 5 11 3 2 Switch 2 1 0 7 0 Switch 3 1 3 2 4 ost B 8

Features of VC switching Source must wait full RTT before sending any data (VC set up delay) While the connection request contains the full address for destination, each data packet contains only a small identifier per-packet header overhead smaller than in datagram switching If a switch or a link in a connection fails, the connection is broken and a new one needs to be established. Connection setup provides an opportunity to reserve resources in POTS/cellular networks it is checked if time slot is available or not In general, it can be checked if enough bandwidth/buffer resources exist and if users delay requirements can be met Examples: POTS network, cellular networks, Frame Relay, ATM 9 Features of datagram switching No connection set up delay host can send data as soon as it is ready network does not need to store connection state As a result, source can not know if the network is capable of delivering a packet if the destination host is even up Packets are treated independently it is possible to route around link and node failures important e.g. in military environment (ARPANET developed for military) Since every packet must carry the full address of the destination, the overhead per packet is higher than for the connection-oriented model forwarding based on global addresses more resource consuming 10

Traffic control and switching techniques Congestion packets arrive at a rate greater than link speed ÿ buffer fills up Preventive traffic control network attempts to ensure that congestion does not occur by allocating resources to VCs circuit switching model may result in poor resource utilization (if VCs exhibit random behavior) Reactive traffic control network tries to recover from congestion as fast as possible datagram switching model achieves better utilization since resources are not dedicated to any particular connection, resources shared among all (statistical multiplexing) 11 Outline General switching techniques Bridges and LAN switches ATM technology ATM in LAN 12

Extending LANs A single LAN all stations on the LAN share bandwidth limited geographical coverage (Ethernet 2500 m) = single collision domain nof stations limited Techniques: hubs bridges Ethernet switches 13 ubs Layer 1 device repeats received bits on one interface to all other interfaces (repeaters) ubs can be arranged in hierarchy provides star topology Backbone hub Each connected LAN referred to as LAN segment ub ub ubs do not isolate collision domains collisions may happen with any node on any segment Note! Still a single LAN and collision domain 14

ubs: advantages and limitations ub advantages: simple, inexpensive device hierarchy provides graceful degradation: portions of the LAN continue to operate if one hub malfunctions extends maximum distance between node pairs (100m per ub) ub limitations: single collision domain results in no increase in max throughput multi-tier throughput same as single segment throughput individual LAN restrictions pose limits on number of nodes in same collision domain and on total allowed geographical coverage cannot connect different Ethernet types (e.g., 10BaseT and 100baseT) 15 Simple bridges Connect two or more LANs with a bridge Simple bridge all packets from a particular port forwarded on all other ports level 2 forwarding/switching (does not add packet header) isolates collision domains Ethernet bridge uses CSMA/CD to transmit packets onto connected LANs A B C Port 1 Bridge Port 2 X Y Z 16

Learning bridges Idea: forward only when necessary bridges maintain forwarding tables datagram switching on layer 2 Dynamic algorithm bridge examines source address of each packet seen on a port addresses saved in a table table entries have time outs (if host moves from one segment to another) broadcast frames always forwarded Table is an optimization; need not be complete A B C Bridge Port 1 Port 2 X Y Z ost Port A 1 B 1 C 1 X 2 Y 2 Z 2 17 Spanning tree algorithm Problem: loops in topology loops used to provide redundancy in case of link failure C A B3 B5 B Bridges run a distributed spanning tree algorithm selects which bridges actively forward traffic subset of network graph representing a tree that spans all nodes dynamic algorithm: tree reconfigures when topology changes developed by Radia Perlman now IEEE 802.1 specification E G B2 I B6 D B1 B4 B7 F J K 18

Algorithm overview Bridges have unique ids (B1, B2, etc.) A Bridge with smallest id is root root forwards all traffic onto all ports Select designated bridge on each LAN C B2 B3 D B5 B7 B K LAN may be connected to many bridges E F bridge closest (=min nof hops) to root selected as designated bridge idusedtobreakties G B1 Each bridge forwards frames over each LAN for which it is the designated bridge Dynamic (survives link failures), but not able to utilize multiple paths during congestion I B6 B4 J 19 Algorithm details Bridges exchange configuration messages containing id for bridge sending the message id for what the sending bridge believes to be root bridge distance (hops) from sending bridge to root bridge Each bridge records current best configuration message for each port identifies root with smaller id identifies root with same id but with shorter distance root id and distance are same but sending bridge has smaller id Initially, each bridge believes it is the root When learn not root, stop generating config messages in steady state, only root generates configuration messages When learn not designated bridge, stop forwarding config messages in steady state, only designated bridges forward config messages Root continues to periodically send config messages If any bridge does not receive config message after a period of time, 20 it starts generating config messages claiming to be the root

Algorithm example (Y, d, X): Message from X, at distance d from root Y Consider node B3: A B3 B 1 B3 receives (B2, 0, B2) C B5 2 2 < 3, B3 accepts B2 as root B2 D B7 K 3 B3 increments d and sends (B2, 1, B3) towards B5 E F 4 B2 accepts B1 as root (lower id) and sends (B1, 1, B2) towards B3 G B1 5 B5 accepts B1 as root and sends (B1, 1, B5) towards B3 6 B3 accepts B1 as root, notes that B2 and B5 are closer to root ÿ stop I B6 B4 J 21 Broadcast and Multicast Forward all broadcast/multicast frames current practice A B3 B Possible optimization for multicast: C B5 learn when no group members downstream (similarly as in learning bridges) typically group members are not sending any traffic accomplished by having each member of group G send a frame to bridge multicast address with G in source field not widely deployed E G B2 I B6 D B1 B4 B7 F J K 22

Bridges: advantages and limitations Advantages: isolates collision domains (higher throughput than when using hubs) can connect multiple LAN types (different Ethernets, Token Rings) transparent: no need for any changes in end hosts used to build network of tens of LAN segments within e.g. a campus area Limitations: scalability: spanning tree algorithm does not scale broadcast does not scale (VLANs can be used to alleviate) heterogeneity: not all network technologies use 48 bit addresses Caution: beware of transparency in an extended LAN, there may be congestion, larger delays,... end host applications should not assume that all is behind a single LAN 23 Ethernet switches Layer 2 forwarding and filtering using LAN addresses Uses switching (frames can be sent in parallel between multiple ports) Can accommodate large number of interfaces 100BaseT mix of 10/100/1000 Mbit Ethernets shared (multiple hosts) or dedicated (single host) Ethernets 10BaseT Common configuration star topology: hosts connected to switch Ethernet, but no collisions! 24

Building a campus area network Backbone Bridge Bridge ub Computer Science Mathematics Department Electrical Engineering 25 Outline General switching techniques Bridges and LAN switches ATM technology ATM in LAN 26

istory Traditionally: dedicated networks for different services For example: telephone, telex, data, broadcast networks Optimized for the corresponding service Need for integration of all services into a single ubiquitous network One policy, one system, universal service (T. Vail, AT&T s first president) Early 80 s: Research on Fast Packet Switching started Answer from the Telecom World : B-ISDN 1985: B-ISDN specification started by Study Group SGXVIII of CCITT 1988: Approval of the first B-ISDN recommendation (I.121) by CCITT idea: replace old PSTN network with new one Chosen implementation method: ATM 1990: ATM chosen for the final transfer mode for B-ISDN by CCITT 1991: ATM Forum founded to accelerate development of ATM standards to take into account needs of the Computer World 27 Design objectives Flexibility integration of different types of traffic (like voice, data and video) into a single network supporting any transmission rate (even variable) combination of best properties of circuit and packet switching Guaranteed Quality of Service (QoS) end-to-end delay, delay variation, cell loss ratio Scalability suitable for both WAN and LAN Fastness both in switching and transmission ÿ broadband Supports multiple physical layers typically used over SD (SONET) Minimal error correction (only header protected by check sum) very low bit error rates on optical links 28

ATM Connection oriented: virtual connections set up end-to-end before information transfer B Q.2931 signaling protocol resource reservation possible but not mandatory All information carried in short, fixed-length packets (cells) A 2 1 4 4 1 1 1 1 along the route chosen for that virtual connection statistical multiplexing at nodes identifier label (local address) at cell header no error detection/recovery for the information field 29 Technical choices Connection oriented ÿ resource reservation possible ÿ guaranteed QoS possible Packet switching ÿ statistical multiplexing ÿ flexibility (any bit rate possible) and efficiency (high utilization) Packets small and fixed-length (cells) ÿ cell switching ÿ fast switching, easier to implement in hardware 30

Cell Cell = short, fixed-length packet 5 48 Total length = 53 bytes (octets) eader: 5bytes 53 GFC, generic flow control (4 [0] bits at UNI [NNI]), (not used) VPI, virtual path identifier (8 [12] bits ÿ 256 [4096] values) VCI, virtual channel identifier (16 bits ÿ 65,536 values) PT, payload type (3 bits) 4 values (1xy) used for management functions user data = 0xy, x used for EFCI (ABR), y=delineate AAL5 frames CLP, cell loss priority (1 bit) EC, CRC-8 header error control (8 bits) Information field: 48bytes carried transparently, without error detection/recovery 31 Virtual connections Basic connection: Virtual Channel Connection (VCC) identified by the VPI/VCI pair (24 [28] bits) in each cell header max. 16,777,216 [268,435,456] VCCs per physical link VPI and VCI fields are local labels ÿ reuse possible in different physical links ÿ scalability Aggregated connection: Virtual Path Connection (VPC) identified by the VPI field (8 [12] bits) in each cell header max. 256 [4096] VPCs per physical link consists of the VCCs with the same VPI (can be switched together!) Physical link VPC1 VPC2 VCC11 VCC12 VCC21 VCC22 32

Virtual paths Pros faster connection establishment easier network management differentiated QoS possible virtual networks possible Cons reduced statistical multiplexing gain VC Switch VP Crossconnect VC Switch Physical Link Physical Link VCC VPC 33 Variable vs. fixed length packets No optimal length if small: high header-to-data overhead but e.g. traditional telephone calls generate small sized packets ATM intended to carry all traditional voice traffic effectively if large: low utilization for small messages but, in computer networking packets are typically large Fixed length packets easier to switch in hardware in 80 s a lot of effort put into designing hw for switching fixed size packets simpler to implement than variable size packet switching can utilize parallelism in switch design (switches operate based on slotted time) 34

Big vs. small packets (1) Small improves queue behavior finer-grained pre-emption point for scheduling link maximum packet = 4KB link speed = 100Mbps transmission time = 4096 x 8/100 = 327.68us high priority packet may sit in the queue 327.68us in contrast, 53 x 8/100 = 4.24us for ATM near cut-through behavior two 4KB packets arrive at same time link idle for 327.68us while both arrive at end of 327.68us, still have 8KB to transmit in contrast, can transmit first cell after 4.24us at end of 327.68us, just over 4KB left in queue 35 Big vs. small packets (2) Small improves latency (for voice) voice digitally encoded at 64KBps (8-bit samples at 8Kz) need full cell s worth of samples before sending cell example: 1000-byte cells implies 125ms per cell (too long) smaller latency implies no need e.g. for echo cancellors ATM compromise: 48 bytes = (32+64)/2 Europe: 32 bytes USA: 64 bytes 36

Segmentation and reassembly (SAR) Problem: higher layer frames longer than 48 bytes frames need to fragmented and reassembled ATM Adaptation Layer (AAL) AAL 1 and 2 designed for applications that need guaranteed rate (e.g., voice, video) AAL 3/4 designed for packet data AAL 5 is an alternative standard for packet data Data Data AAL AAL ATM ATM 37 AAL5 Problems with AAL 3/4 complex, too much protocol overhead 44 bytes of 48 available for splitting AAL 3/4 frame into cells 4 bytes used for segmentation header (enables multiplexing, CRC-10) AAL 5 all 48 bytes available for AAL 5 frame segmentation, no multiplexing inpractice,aal5isused(aal3/4not) CS-PDU format (CS-PDU = AAL 5 frame, CS=Convergence Sublayer) < 64 KB 0 47 bytes 16 16 32 Data Pad Reserved Len CRC-32 pad so trailer always falls at end of ATM cell length: size of PDU (data only) CRC-32 (detects missing or misordered cells) Cell Format end-of-pdu bit in Type field of ATM header 38

Outline General switching techniques Bridges and LAN switches ATM technology ATM in LAN 39 istorical perspective ATM also intended for LAN environment switched technology offers better scalability aimed to operate at link speeds of 155 Mbps and above (faster than 10BaseT) idea: ATM replaces Ethernet and Token ring but 100BaseT Ethernet and Ethernet switches appeared (almost same speed as ATM) Ether ATM ATM in the LAN backbone does not have distance limitations link speeds above 622 Mbps hosts connected to Ethernet switches, ATM in backbone but now Gigabit Ethernet competes with ATM in backbone Ether Ether 40

Problems with ATM in LAN Broadcast (and multicast) crucial for LAN operation easily implemented in shared media LANs (Ethernet) but, ATM is connection oriented and switched in nature... broadcast important for ARP (Address Resolution Protocol) Two approaches ATMARP: does not make assumptions on existence of broadcast ATM LANE (LAN Emulation): makes ATM behave like shared media LAN adds number of functional entities to network to make an illusion of shared medium, does not add functionality to ATM switches LEC = LAN Emulation Client (host connected to ATM LAN) Servers: LECS (LANE Configuration Server), LES (LANE Server), BUS (Broadcast and Unknown Server) Problem with addresses: ATM uses NSAP or E.164 addresses, different than 48 bit MAC addresses to make ATM work in LAN environment each ATM device needs a MAC address also 41 Overview of LANE (1) Joining the LAN and setting up broadcast new client (2) contacts LECS using a well known VC (1) 2 provides LECS with its address and receives configuration information about the LAN and learns ATM address of LES 2 contacts LES and provides its ATM address and MAC address, 2 learns ATM address of BUS (2) BUS maintains single point-tomultipoint connection connecting all registered clients 2 signals to BUS (3) 2 is added to the multipoint connection (4) LECS LES BUS (1) (2) (3) (4) 1 2 42

Overview of LANE (2) Delivery of unicast traffic to a particular MAC address 2 wants to send to 1 2 does not know ATM address of 1 first packets sent directly to BUS (1) 2 sends request to LES, LES returns ATM address corresponding to the MAC address (2) 2signalsaVCdirectlyto1(3) LECS 1 LES (2) (3) BUS 2 (1) old unused VCs time out and are disconnected automatically 43