Applied Networks & Security

Similar documents
Applied Networks & Security

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

EE 122: Ethernet and

Computer Networks Principles LAN - Ethernet

CSMA/CD (Collision Detection)

Medium Access Protocols

Summary of MAC protocols

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Access Technologies! Fabio Martignon

Reminder: Datalink Functions Computer Networking. Datalink Architectures

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ECE 158A: Lecture 13. Fall 2015

6th Slide Set Computer Networks

Introduction to Networks and the Internet

ECE 4450:427/527 - Computer Networks Spring 2017

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Principles behind data link layer services

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Link Layer and Ethernet

Link Layer and Ethernet

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Media Access Control (MAC) Sub-layer and Ethernet

Redes de Computadores. Medium Access Control

Networking Technologies and Applications

Data Link Layer, Part 3 Medium Access Control. Preface

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Computer Networks and Distributed Systems

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Chapter 12 Multiple Access 12.1

Data and Computer Communications. Chapter 11 Local Area Network

CS 3516: Advanced Computer Networks

Lecture 15 Networking Fundamentals. Today s Plan

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Ethernet. Introduction. CSE 3213 Fall 2011

More on LANS. LAN Wiring, Interface

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Computer Networks Principles LAN - Ethernet

CSE 461: Multiple Access Networks. This Lecture

Aloha and slotted aloha

Local Area Networks (LANs) SMU CSE 5344 /

Multiple Access. Data Communications and Networking

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

CMPE 257: Wireless and Mobile Networking

IEEE standards for local area networks

Data Link Layer, Part 5. Medium Access Control

Applied Networks & Security

Telematics I. Chapter 6 Internetworking. (Acknowledement: These slides have been compiled from H. Karl s set of slides)

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

LAN Interconnection and Other Link Layer Protocols

Direct Link Communication II: Wired Media. Multi-Access Communication

Computer Networks. Wenzhong Li. Nanjing University

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

CSCD 330 Network Programming Spring 2017

Ethernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Unit 7 Media Access Control (MAC)

CPE 548 Exam #1 (50 pts) February 17, 2016

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Chapter 2. Switch Concepts and Configuration. Part I

Principles behind data link layer services:

Principles behind data link layer services:

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Network Protocols. Transmission Control Protocol (TCP) TDC375 Autumn 2009/10 John Kristoff DePaul University 1

LAN Overview (part 2) Interconnecting LANs - Hubs

CMPE 257: Wireless and Mobile Networking

The Link Layer and LANs: Ethernet and Swiches

Link layer: introduction

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

CSC 4900 Computer Networks: Link Layer (2)

ICE 1332/0715 Mobile Computing (Summer, 2008)

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

COS 140: Foundations of Computer Science

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

LAN PROTOCOLS. Beulah A AP/CSE

The MAC layer in wireless networks

Some portions courtesy Srini Seshan or David Wetherall

Switching & ARP Week 3

Data and Computer Communications

Direct Link Communication II: Wired Media. Multi-Access Communication

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Introduction to Ethernet. Guy Hutchison 8/30/2006

Interface The exit interface a packet will take when destined for a specific network.

Transcription:

Applied Networks & Security Wired Local Area Networks (LANs) http://condor.depaul.edu/~jkristof/it263/ John Kristoff jtk@depaul.edu IT 263 Spring 2006/2007 John Kristoff - DePaul University 1

Local Area Network (LAN) LAN can be a difficult term to define Generally speaking... Most computers have a LAN link interface Ethernet, by far, most popular link technology Good capacity, measured in Mb/s minimally Most LAN links cover short distances Historically shared medium access Increasingly less true today IT 263 Spring 2006/2007 John Kristoff - DePaul University 2

Cabling demonstration Let's look at and talk about some basic cabling, connectors and installation practices If you're just looking at these slides outside of class with no video, well, you should have been here IT 263 Spring 2006/2007 John Kristoff - DePaul University 3

The data link interface I don't remember where I swiped this diagram from :-( IT 263 Spring 2006/2007 John Kristoff - DePaul University 4

Physical (and logical) topologies diagrams courtesy of http://www.netbook.cs.purdue.edu IT 263 Spring 2006/2007 John Kristoff - DePaul University 5

Ethernet Most popular link technology by far IEEE standardized as IEEE 802.3 Several generations and updates Mostly same frame format Updates mainly to increase transmission rate Physical layer requirement changes as needed IT 263 Spring 2006/2007 John Kristoff - DePaul University 6

Ethernet transmission diagram courtesy of http://www.netbook.cs.purdue.edu One station successfully transmits at a time Signal propagates the entire cable length (bus) All stations receive all transmissions CSMA/CD medium access control IT 263 Spring 2006/2007 John Kristoff - DePaul University 7

CSMA/CD Carrier sense (CS) Wait until channel is idle, then transmit Multiple access (MA) All stations on channel use same MAC protocol Collision detection (CD) Listen to medium while transmitting Detect if another station transmits simultaneously If collision, enter back-off algorithm IT 263 Spring 2006/2007 John Kristoff - DePaul University 8

Exponential back-off algorithm Sending station backs-off after collision is detected Let 1 slot time = 512 bit times (64 byte min. frame) Upon 1 st collision, randomly choose {0,1} slot delay Upon 2 nd collision, randomly choose {0,1,2,3} Choose from [0 to 2 n 1], N=transmission attempt Up to a maximum of 16 retransmission attempts And up to a maximum of 1023 * slot delay time Give up after 16 retransmission attempts Capture effect: brief, unfair advantage for busy sender, in practice a non-problem IT 263 Spring 2006/2007 John Kristoff - DePaul University 9

Collision domain Min length frame must be >= than the maximum round trip time (RTT) of the entire ethernet segment Must hear collision before transmission completes Historically minimum frame was 512 bits (64 bytes) Requires 46 payload bytes, pad if unavailable Cabling distance decreases as speed increases Use of full-duplex removes collision domain restriction IT 263 Spring 2006/2007 John Kristoff - DePaul University 10

Are collisions bad? Collision stats are usually meaningless Unless the collisions are late Or you see them on full-duplex links Collisions are an efficient arbitration scheme Collisions resolved and detected within the round trip time (RTT) of the channel (that is, quickly), stations do not finish their frame transmissions Short answer, no, collisions usually aren't bad IT 263 Spring 2006/2007 John Kristoff - DePaul University 11

Ethernet frame format Sender fills in: It's own src address Target dst address Type (next protocol) Payload Calculated FCS IT 263 Spring 2006/2007 John Kristoff - DePaul University 12

Promiscuous mode Interface accepts all frames regardless of destination address Useful for debugging Available on most wired adapters, some wireless chipsets do not support it IT 263 Spring 2006/2007 John Kristoff - DePaul University 13

Ethernet addressing IEEE standard address is 48 bits long Written as 12 hexadecimal digits (e.g. ff:ff:ff:ff:ff:ff:ff) Also known as: Layer 2 address Hardware address MAC address Data link address IT 263 Spring 2006/2007 John Kristoff - DePaul University 14

Visualizing ethernet addresses IT 263 Spring 2006/2007 John Kristoff - DePaul University 15

Why bridge? LANs may have physical distance limitations Limitation on the number of hosts per LAN Allocate more capacity per station Contain traffic to local LAN segment Accommodate hosts with no layer 3 protocol Support any layer 3 protocol Connect dispersed LANs together IT 263 Spring 2006/2007 John Kristoff - DePaul University 16

Visualizing bridges diagrams courtesy of http://www.netbook.cs.purdue.edu IT 263 Spring 2006/2007 John Kristoff - DePaul University 17

Transparent bridging diagram courtesy of http://www.netbook.cs.purdue.edu Bridge listens to each interface promiscuously Bridge inspects layer 2 information Forward frames to other interfaces if necessary IT 263 Spring 2006/2007 John Kristoff - DePaul University 18

Bridge forwarding and filtering Receive a frame on an ingress interface Inspect destination address If multicast/broadcast, forward to all except incoming (ingress) interface Query address table (cache) for destination address If found, forward out (egress) associated port Except when ingress = egress, just drop it If not found, flood to all interfaces except the incoming (ingress) interface IT 263 Spring 2006/2007 John Kristoff - DePaul University 19

Source address learning Bridge listens promiscuously on all interfaces Store source address and associated ingress interface port in address table (cache) IT 263 Spring 2006/2007 John Kristoff - DePaul University 20

Bridge table (cache) entry aging Low-priority or non-time critical operation Allows station mobility and small table size Aging process periodically clears the H bit If H bit is clear, clear the V bit If H and V bits are clear, remove the table entry IT 263 Spring 2006/2007 John Kristoff - DePaul University 21

LAN switches LAN switches = LAN bridges Switches imply newer, better, faster, bigger, etc. Switching is a successful marketing term Often used to further segment shared LANs Switch port per device/customer becoming the norm Most LAN switches are relatively simple and cheap IT 263 Spring 2006/2007 John Kristoff - DePaul University 22

Why switch? Reduce/remove shared medium contention Maximize aggregate capacity Extend distance limitations Data rate flexibility IT 263 Spring 2006/2007 John Kristoff - DePaul University 23

Visualizing LAN switches IT 263 Spring 2006/2007 John Kristoff - DePaul University 24

Store and forward switching Completely receive frame on ingress port Check frame check sequence (FCS) for validity Perform address learning Make forwarding/filtering decision IT 263 Spring 2006/2007 John Kristoff - DePaul University 25

Cut-through switching Begin making forwarding decision as soon as you get the destination address (do not wait for the entire frame) Goal is to improve switch latency More successful marketing IT 263 Spring 2006/2007 John Kristoff - DePaul University 26

Cut-through switching fallacies Latency only improves if outgoing (egress) port is free, this is not when you need the improvement Switch latency is the least of your problems Multicast/broadcast cut-through too? Input (ingress) and output (egress) port rate must match Propagates errors (but generally not a problem) Store-and-forward is usually the default (good choice) IT 263 Spring 2006/2007 John Kristoff - DePaul University 27

LAN switch configurations Bounded/stand-alone Stack-able Chassis IT 263 Spring 2006/2007 John Kristoff - DePaul University 28