The MAC Layer. Jean Yves Le Boudec 2015

Similar documents
The MAC Layer. Jean Yves Le Boudec 2015

The MAC Layer. Mukhopadhyay. Jean Yves Le Boudec 2017

The MAC Layer. Contents. Textbook. Jean Yves Le Boudec Fall 2012

The MAC Layer. Clicker registration

The MAC Layer. Mukhopadhyay. Jean Yves Le Boudec 2018

Contents. The MAC layer CN2. 1. MAC as Shared Medium 2. MAC as interconnection at small scale 3. MAC and Link layer. Jean-Yves Le Boudec, EPFL

CN2 ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE. The MAC layer. Jean-Yves Le Boudec Fall Jean-Yves Le Boudec, EPFL

Computer Networks Principles LAN - Ethernet

Redes de Computadores. Medium Access Control

Link Layer and Ethernet

Link Layer and Ethernet

Lecture 4b. Local Area Networks and Bridges

Part3. Local Area Networks (LAN)

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Summary of MAC protocols

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

The Netwok Layer IPv4 and IPv6 Part 1

LAN PROTOCOLS. Beulah A AP/CSE

The Netwok Layer IPv4 and IPv6 Part 1

CCNA Exploration1 Chapter 7: OSI Data Link Layer

The Netwok Layer IPv4 and IPv6 Part 1

Computer Networks Principles LAN - Ethernet

Medium Access Protocols

The Netwok Layer IPv4 and IPv6 Part 1

Principles behind data link layer services

Physical and Data Link layers

Reminder: Datalink Functions Computer Networking. Datalink Architectures

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

EE 122: Ethernet and

The TCP/IP Architecture. Jean Yves Le Boudec 2017

ECE 158A: Lecture 13. Fall 2015

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

The Netwok Layer IPv4 and IPv6 Part 1

The TCP/IP Architecture. Jean Yves Le Boudec 2017

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Layer 2 functionality bridging and switching

CS 640 Lecture 4: 09/11/2014

The TCP/IP Architecture Jean Yves Le Boudec 2014

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

The TCP/IP Architecture Jean Yves Le Boudec 2014

The TCP/IP Architecture. Jean Yves Le Boudec 2015

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Principles behind data link layer services:

The TCP/IP Architecture. Jean Yves Le Boudec 2015

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

IEEE 802 LANs SECTION C

The Link Layer and LANs. Chapter 6: Link layer and LANs

Data Link Layer, Part 5. Medium Access Control

The TCP/IP Architecture. Jean Yves Le Boudec 2015

Principles behind data link layer services:

Principles behind data link layer services:

CARRIER SENSE MULTIPLE ACCESS (CSMA):

The MAC Address Format

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Raj Jain. The Ohio State University Columbus, OH

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Local Area Networks. Ethernet LAN

Wireless LANs. ITS 413 Internet Technologies and Applications

Cisco Cisco Certified Network Associate (CCNA)

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Study Guide. Module Two

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Medium Access Control Sublayer

CSE 461: Multiple Access Networks. This Lecture

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

1: Review Of Semester Provide an overview of encapsulation.

Networking Technologies and Applications

CSC 4900 Computer Networks: The Link Layer

Chapter 5 Link Layer and LANs

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Switched Ethernet Virtual LANs

Unit A - Connecting to the Network

1. Data Link Layer Protocols

Chapter 5: Link layer

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

More on LANS. LAN Wiring, Interface

Chapter 12 Multiple Access 12.1

Chapter 3: Industrial Ethernet

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Lecture 7: Ethernet Hardware Addressing and Frame Format. Dr. Mohammed Hawa. Electrical Engineering Department, University of Jordan.

Chapter 5 Reading Organizer After completion of this chapter, you should be able to:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Last Lecture: Data Link Layer

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Introduction to Ethernet. Guy Hutchison 8/30/2006

Chapter 5 Link Layer and LANs

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Transcription:

The MAC Layer Jean Yves Le Boudec 2015 1

Contents 1. MAC as Shared Medium : The Ethernet Myth and the WiFi Reality 2. MAC on cabled systems: the world of switches 3. Format and addresses 4. Virtual LANs 5. Architecture Aspects 6. Security aspects Textbook Sections 2.6, 3.16 and 4.12 2

1: Shared Medium Access MAC = medium access control Why did engineers invent the MAC layer? Share a cable (Ethernet, Token Ring, Powerline) Use a wireless radio link (GSM, WiFi, Bluetooth) What is the problem? If several systems talk together, how can we decode? Solution 1: joint decoding (decode everyone) used in CDMA cellular networks complex Solution 2: mutual exclusion protocol (only one system can talk at a time) + distributed (no central component) 3

How does MAC layer work? there are many solutions, called: Token Ring, Aloha, CSMA, CMSA/CA, CSMA/CD, RMAC, etc We describe here the most basic one, called CSMA/CD, used on Ethernet cables Powerline ( homeplug MAC ) is similar (CSMA/Collision Avoidance) for transmission over home power lines Radio links (WiFi) is also similar, with a few complications see course on mobile networks for a very detailed explanation 4

CSMA/CA derives from Aloha Aloha is the basis of all non deterministic access methods. The Aloha protocol was originally developed for communications between islands (University of Hawaï) that use radio channels at low bit rates. It assumes one shared channel from remote to center, and a separate (non interfering) channel from center to remotes Collisions occur when two packet transmissions overlap, and if a packet is lost, then source has to retransmit; the retransmission strategy is not specified here; many possibilities exist. We will see the one used for CSMA/CD. There is no feedback to the source in case of collision (was too complex to implement at that time). The picture shows a radio transmission scenario; Aloha can also be used on a cable (bus). It is used nowadays in cases where simplicity is more important than performance (for example: machine bus) The maximum utilization can be proven to be 18%, which is small. This is assuming an ideal retransmission policy that avoids unnecessary repetitions of collisions. 5

Remote ALOHA data Remote Center ack Remote Remote Transmission procedure at remote 6

7 CSMA (carrier sense multiple access) improves on Aloha by requiring that stations listen before transmitting

CSMA (carrier sense multiple access) improves on Aloha by requiring that stations listen before transmitting 8 assumes a single transitive channel (everyone can hear everyone)

CSMA collisions A. Cannot occur because the medium is transitive B. Can occur if the bandwidth delay product is smaller than 1 C. Can occur regardless of the bandwidth delay product D. I don t know Cannot occur because th... 0% 0% 0% 0% Can occur if the bandwid... Can occur regardless of t.. I don t know 9

12 CSMA / CD (Collision Detection) detects collisions as they occur Ack replaced by CD

13 A senses idle channel, starts transmitting shortly before T, B senses idle channel, starts transmitting CSMA / CD Time Diagram 1 0 T A B

14 A senses collision, continues to transmit 32 bits ( jam ) B senses collision, continues to transmit 32 bits ( jam ) CSMA / CD Time Diagram 2 0 T A B

15 A waits random time t1 B waits random time t2 B senses channel idle and transmits A senses channel busy and defers to B A now waits until channel is idle CSMA / CD Time Diagram 3 0 T t1 A B t2

CSMA/CD improves on CSMA by requiring that stations detect collisions and stop transmitting (after 32 bits, called jam bits, in order to ensure that all circuits properly recognize the presence of collisions). CSMA/CD has a better performance than Aloha or CSMA After a collision is detected, stations will re attempt to transmit after a random time. Acknowledgements are not necessary because absence of collision means that the frame could be transmitted (see Minimum Frame Size ). The interframe delay ( gap ) is 9.6 µs. It is used to avoid blind times, during which adapters are filtering typical noise at transmission ends. The random time before retransmission (exponential backoff) is chosen in such a way that if repeated collisions occur, then this time increases exponentially. The effect is that in case of congestion (too many collisions) the access to the channel is slowed down. 16

A Minimum Frame Size is Necessary to Guarantee Collision Detection Frame sent by A is too short: collision is not visible at A but is visible at C Frame sent by A is large enough collision is visible at A A C B A C B CSMA/CD imposes a minimum frame size = 64 B And a maximum network diameter : 2 km for 10Mb/s, 200m for 100 Mb/s 17

CSMA/CD = Ethernet on Coax Cables 18

WiFi = CSMA/CA (Collision Avoidance) = variant of CSMA/CD where Collision Detection is replaced by Acknowledgements - Does not assume collisions can all be detected because some systems may not be within reach; absence of ack interpreted as collision - CTS heard by C prevents many collisions - Other optimizations to avoid collisions - See textbook / mobile network course 19

The Maximum Packet Size with 100 Mb/s 1. 50 B 2. 64 B 3. 150 B 4. 1024 B 5. 1500 B 6. 12468 B 7. There is no maximum size 8. I don t know Ethernet is 0% 0% 0% 0% 0% 0% 0% 0% 50 B 64 B 150 B 1024 B 1500 B 12468 B I don t know 20

The Minimum Packet Size with 100 Mb/s 1. 50 B 2. 64 B 3. 150 B 4. 1024 B 5. 1500 B 6. 12468 B 7. There is no minimum size 8. I don t know Ethernet is 0% 0% 0% 0% 0% 0% 0% 0% 50 B 64 B 150 B 1024 B 1500 B 12468 B I don t know 21

In a WiFi network with a single channel and a single base station, how many frames can be transmitted concurrently? 1. At most one in total 2. One from mobile to base station and one from base station to mobile 3. At most one per mobile to base station and one from base station 4. At most one per mobile to base station and one per mobile from base station 5. I don t know 0% 0% 0% 0% 0% At most one in total mobile to base sta... e per mobile to b... e per mobile to b... I don t know 22

2. Ethernet Switches : Why and What CSMA, i.e. the MAC layer described in section 1, or a variant of it, is found in Wireless networks Shared medium Ethernets In most wired settings today, there is no shared medium and no CSMA protocol. To understand this, we need to go through history. 24

25 Step 1: from Shared to Cable Passive Hubs Passive hub = a cabling arrangement that facilitates cabling

Step 2: Active Hubs Active hub replaces cabling by repeaters Repeater = electronic device that receives one bit on one port and replays it on the other port Facilitates maintenance detection of faulty lobe Shows the status of each lobe remotely accessible can switch off a cable lobe Point to point cables only lobe Active hub 26

The Active Hubs Uses Repeaters A repeater repeats bits received on one port to all other ports if collision sensed on one port, repeat random bits on other port At this step there is no change to CSMA/CD For end systems, same as if on one shared cable One network with repeaters = one collision domain Repeaters are intermediate systems of the physical layer Repeaters 1 bit - buffers lobe Active hub Interconnection bus 27

28 Point to Point cabling can be used Unshielded twisted pair (similar to telephone analog line cables) (UTP) is cheaper and easier to install (can be bent) but does not support well many multiple transmitters or receivers UTP cables have one pair of wires for each direction of transmission No change to CSMA/CD When A sends a frame to B, C sees medium busy When A sends a frame (on one pair), A also listens (on the other) to detect collisions A B C Active hub

Step 3: Bridges ( = Switches ) Why invented? To improve performance Bridges act on entire Ethernet frames instead of bits : a frame is received on one port, stored in a frame buffer, analyzed by the bridge software, and re sent one some other port Frame buffers Switch 29

30 Bridges separate collision domains A bridge is a queuing system, there is no CSMA inside the bridge A bridge can interconnect several collision domains, which remain separate E.g. when A sends a frame to Bridge, B senses medium busy but C, D, E and F do not. E.g. it is possible to send in parallel A > bridge, C > D and F > bridge port 1 port 3 hub Bridge hub A B E F port 2 C hub D 3 collision domains

Bridges use a forwarding table with exact match port 1 port 3 hub Bridge hub A B E F port 2 C hub D 3 collision domains Forwarding Table Dest MAC Addr Port Nb A 1 B 1 C 2 D 2 E 3 F 3 Forwarding table contains list of destination MAC addresses and ports Bridge listens to all traffic on all ports Reads destination MAC address and obtain destination port from table If destination port is same as origin, discard frame; else send to port 31

32 Bridges learn addresses by observing traffic port 1 port 3 hub Bridge hub A B E F port 2 C hub D 3 collision domains Forwarding Table Dest MAC Addr Port Nb A 1 B 1 C 2 D 2 E 3 F 3 How can a bridge build its forwarding table? table built by learning from Source Address field in MAC frame learnt addresses times out if not re learnt If destination address not in table, frame is broadcast to all ports Multicast addresses are handled separately see IP multicast

How many frames can be transmitted in parallel when H) X is a hub or S) X is a switch? 1. H: 1; S: 1 2. H: 1; S: 3 3. H: 3; S: 1 4. H: 3; S: 3 5. I don t know 0% 0% 0% 0% 0% H: 1; S: 1 H: 1; S: 3 H: 3; S: 1 H: 3; S: 3 I don t know 33

Step 4: Full Duplex Ethernet LIM (Less is More) If we run CSMA/CD on a point to point link, we have a half duplex link because if one device sends, all others have to wait (by the rules of CSMA) this is what happens with hubs UTP cables have two pairs of cables; only one is used at any point in time If we use only switches (no hub) and point to point links (no coax) then we can do better Allow to send and receive without any constraint This is called Full Duplex Ethernet! No CSMA/CD! Devices sense whether they are connected to a hub or a switch in order to decide whether to use CSMA/CD or not Using physical layer control signals (auto negotiation pulses) 35

36 Step 5. Networks of bridges The method of learning can be extended to networks of bridges Forwarding Table at B3 port 1 port 2 B3 Dest MAC Addr Port Nb port 1 port 2 B1 port 1 port 2 B2 A 1 B 1 C 2 X 1 Y 2 Z 2 A X B Y C Z

A. Yes because learning propagates B. Yes because MAC addresses are unstructured C. Only in some special cases D. I don t know Does this method always work? 0% 0% 0% 0% 37 Yes because learning pr... Yes because MAC address.. Only in some special cases I don t know

The Spanning Tree Protocol Forces the Active Topology to be a Tree Bridges run a protocol between neighboring bridges, called the Spanning Tree Protocol What: desactivate some ports such that the remaining topology is a tree that spans all bridges + adapt to failures and additions See module Bridges for how this is done 39

Bridges are Transparent to End Systems Today Ethernet cabling uses primarily bridges (switches) rather than repeaters (hubs) There is no difference between the two from a protocol viewpoint: bridges are transparent (i.e. invisible) to endsystems but there is a difference in performance and connection to a bridge is usually full duplex whereas to a hub it is half duplex in-inr Ethernet hubs (repeaters) or switches (bridges) lrcsuns 128.178.156.24 08:00:20:71:0D:D4 LRC A typical cabling example lrcpc3 128.178.156.7 00:00:C0:B8:C2:8D lrcmac4 128.178.156.23 08:00:07:01:a2:a5 40

41 How many frames can be transmitted in parallel 1. 1 2. 3 3. 6 4. > 6 5. I don t know (all boxes are switches, i.e. bridges)? A port 1 port 3 Sw1 Sw0 Sw3 B E port 2 C F Sw2 D 0% 0% 0% 0% 0% 1 3 6 > 6 I don t know

3. Ethernet Frame format Ethernet frame = Ethernet PDU An Ethernet frame typically transports an IP packet, sometimes also other Type of protocol contained in the Ethernet packet (hexa): 0800: IPv4 0806: ARP (used by IPv4) 86DD: IPv6 8847: MPLS unicast 88F7: Precision Time Protocol 7 B 1 B = 10101011 6 B 6 B 2 B <= 1500 B 4 B Ethernet V.2 frame preamble SFD DA SA Type MAC payload e.g. IPv4 packet FCS DA = destination address SA = source address bits used to detect start of frame MAC header MAC payload MAC trailer 43

The preamble is used for the receivers to synchronize (01010101 terminated by 0). With Ethernet, transmission starts asynchronously (stations start independently), and between transmissions, the channel is idle. SFD (start frame delimiter) is used to validate the beginning of a frame. Destination length is used to indicate the total length before padding. Padding is required if the minimum frame size of 512 bits = 64 bytes is not reached. There is no frame length field in the header. It is up to the layer using Ethernet to find out the length of the payload. Frames have to be at least 64B and at most 1500B. If needed, padding is inserted to make the frame long enough. The format shown here is called Ethernet v2. There exists another format on Ethernet called IEEE 802.1. With WiFi the format is similar, but the MAC header contains additional fields. 44

Error Detection The MAC layer provides bit error detection the networking engineers decided that the MAC layer should deliver error free packets The physical layer always has some non zero bit error rate. How? On cabled systems, BER 10 10 On wireless systems, BER can be much larger (up to 10 4 ) A Cyclic Redundancy Checksum (CRC, 32 bits) is computed for every frame and inserted in the FCS (frame check sequence) field. It is a polynomial code. It detects frames that have an error. The FCS can detect all single, double, triple errors, all error bursts of length <= 32, most double bursts of length up to 17. The probability that a random collection of bit errors is undetected is 2e 10. On wireless MACs there are additional mechanisms Coding Error recovery by retransmission, similar to the retransmission protocol of TCP 45

Addressing MAC address: 48 bits = adapter number (in principle can be configured). Unique worldwide, in principle. Sender puts destination MAC address in the frame On shared medium LAN: all stations read all frames; keep only if destination address matches. Bridges forward frames only to port that needs it (in principle) Sent in the clear, no encryption On a shared medium LAN (WiFi or Ethernet concentrator, all systems see the frame and discard it except destination. With a bridge, only destination sees the frame 46

47 Ethernet addresses are known as MAC addresses. Every Ethernet interface has its own MAC address, which is in fact the serial number of the adapter, put by the manufacturer. MAC addresses are 48 bit long. The 1st address bit is the individual/group bit, used to differentiate normal addresses from group addresses. The second bit indicates whether the address is globally administered (the normal case, burnt in) or locally administered. Group addresses are always locally administered. When A sends a data frame to B, A creates a MAC frame with source addr = A, dest addr = B. The frame is sent on the network and recognized by the destination. Some systems like DEC networks require that MAC addresses be configured by software; those are so called locally administered MAC addresses. This is avoided whenever possible in order to simplify network management. Data on Ethernet is transmitted least significant bit of first octet first (a bug dictated by Intel processors). Canonical representation thus inverts the order of bits inside a byte(the first bit of the address is the least significant bit of the first byte); The first 24 bits are the Organization Unique Identifier (OUI); the remaining 24 bits are allocated by organization that owns the OUI examples of addresses: 08:00:20:71:0d:d4 (a SUN machine) 00:00:c0:3f:6c:a4 (a PC ) 00:00:0c:02:78:36 (a CISCO router) ff:ff:ff:ff:ff:ff the broadcast address

The MAC Broadcast Address ff:ff:ff:ff:ff:ff = broadcast address On shared medium LAN, all machines receive packet and do not discard it B subscribes to 01:00:5e:02:36:cf C subscribes to 01:00:5e:02:36:cf MAC address A 08:00:20:71:0d:d4 B C Dest Addr = ff:ff:ff:ff:ff:ff 48

49 With Bridges Broadcast frames are sent on all nodes and ports on the spanning tree Dest Addr = ff:ff:ff:ff:ff:ff

MAC Multicast Addresses Multicast = Group ; MAC Addresses with bit 8 == 1 are multicast addresses Ethernet adapter discards such packets except if host subscribes to address Non smart bridges broadcast such frames; smart bridge send only to nodes that subscribe to multicast address using IPv4 or IPv6 subscription protocols (see later) Examples 01 00 5e XX XX XX 33 33 XX XX XX XX 01 80 c2 00 01 81 B subscribes to 01:00:5e:02:36:cf IPv4 multicast IPv6 multicast Precision Time Protocol C subscribes to 01:00:5e:02:36:cf MAC address A 08:00:20:71:0d:d4 B C Dest Addr = 01:00:5e:02:36:cf 50

The destination MAC address is 1. A group address derived from the last 23 bits of the IPv6 target address 2. A group address derived from the last 24 bits of the IPv6 target address 3. A group address derived from the last 32 bits of the IPv6 target address 4. A broadcast address 5. The MAC address of an ARP server 6. I don t know 0% 0% 0% 0% 0% 0% 1. 2. 3. 4. 5. 6. 51

The protocol type in an Ethernet frame header indicates whether 1. the data is a TCP packet or not 2. the data is an IPv4 packet or not 3. Both 4. None 5. I don t know 0% 0% 0% 0% 0% the data is an IPv4 packet.. the data is a TCP packet or... Both None I don t know 53

We have a working environment with IPv4, using Ethernet bridges plus other things. We add IPv6 to the network. Do we need to change the bridge configurations? 1. No, since bridges look only at MAC addresses 2. Yes since the protocol type is different 3. It depends whether SLAAC is used 4. I don t know 0% 0% 0% 0% No, since bridges look only.. Yes since the protocol type is... It depends whether SLAAC is... I don t know 54

Why invented? 4. Virtual LAN Some systems use LAN as access control (e.g. all financial machines on one LAN) Some applications work only on LANs (e.g. itunes broadcast) Goal: Decouple who belongs to which LAN from physical (office) location 55

Virtual LAN VLANs are handled as if they were physically separate different forwarding tables, different spanning trees. How does it work? Configure (network management) which port belongs to which VLAN VLAN label added in Ethernet header on links between switches preamble SFD DA SA VLAN tag Type data FCS 56

A has an IP packet destined to C; S1 is a switch; what should A do? A. Send an ARP request in order to obtain the MAC address of C (then send packet to this MAC address) B. Send an ARP request in order to obtain both the MAC address and the VLAN label of C (then send packet to this MAC address and to this VLAN) C. None of the above D. I don t know SendanARPrequest in SendanARPrequest in? 0% 0% 0% 0% Noneof theabov I don t know 57

59 5. Repeaters and Bridges in TCP/IP Architecture 5 Application Application 5 4 3 2 1 Transport Network LLC MAC Physical L2 PDU (MAC Frame) Physical MAC Physical L2 PDU (MAC Frame) Transport Network LLC MAC Physical 4 3 2 1 End System Repeater = Hub = Concentrator Bridge = Switch End System Bridges are layer 2 intermediate systems Repeaters are in layer 1intermediate systems Layer 3 intermediate systems are IP routers (not shown here)

60 Bridges can be used between different MAC We have here one single LAN layer technologies WiFi Base station Ethernet Concentrator Bridge

WiFi Access Points A WiFi access point is usually the combination of A WiFi base station (implements the WiFi MAC protocol) A bridge with an Ethernet backend WiFi frames differ a bit from Ethernet frames in that there can be 3 MAC addresses: source, destination and access point F Ethernet G One Bridged network E A WiFi B C H WiFi D In packet sent by A to G: source MAC addr = A, dest MAC addr = G, access point address = E 61

Terminology Architecture versus Products architecture = set of protocols and functions defines names in a rigourous way, by standards (IETF or IEEE) Architecture names define function ( what a device does ) Product names (invented by marketing) often says how the device is implemented Architecture name Layer 3 intermediate system = Router Layer 2 intermediate system = Bridge Layer 1 intermediate system = repeater Product names Router PC with IP forwarding On Connection sharing device Bridge (software), switch (hardware) Repeateter, Concentrator, Hub 62

What is a Non Routable Protocol? Some application layers are built directly on top of MAC Ex: some smart grid communication systems Ex: old versions of NetBIOS (networking for PCs) Ex: high precision time synchronization (PTP, IEEE 1588) The corresponding protocol works only in one LAN, and is said non routable data collection application data collection application SV = sampled value protocol 63

64 Web server sends one IP packet to Elaine. At (1), 1. M1 2. M2 3. M3 4. M4 5. I don t know the MAC destination address is M3 M4 Elaine 1 M2 Web server M1

65 Web server sends one IP packet to Elaine. At (1), 1. M1 2. M2 3. M4 4. I don t know the MAC destination address is M2 M3 M4 Elaine 1 M2 Web server M1

6. Security Aspects MAC addresses are sent in the clear. Attacks that result? Eavesdropping (hearing someone else s data) Free riding (inserting a device into a network without authorization) Impersonation (send data with someone else s MAC address; replay attacks) Solutions (MACSEC) Access control require user to show credentials before allowing a given MAC address into the network; shared secret (e.g. WiFi WPA Enterprise ): user knows a password, same for all per user authentication (e.g. WiFi WPA Enterprise ): user has a personal password Authentication: every MAC frame is signed using cryptography and numbered prevents free riding prevents impersonation if access control is per user; Encryption: MAC frame payload is encrypted (not MAC address) > prevents eavesdropping Examples: At EPFL, WiFi uses access control, authentication and encryption; impersonation is not possible. Ethernet is not secured. At home: WiFi WPA Personal does not authenticate MAC addresses; anyone who knows the passphrase can access the network; impersonation is possible. 67

Bart, who is EPFL student, connects his PC to EPFL WiFi, which uses per user access control, authentication and encryption. Bart configures his PC to be a bridge between Ethernet and WiFi and allows Lisa, who is not allowed to access EPFL, to connect to his Ethernet port. Will Lisa be able to connect to the Internet in this way? 1. Yes, provided that Lisa can configure an IP address on the same subnet as Bart 2. Yes, it will work in all cases 3. No, it will not work in any case provided that Lisa can c 4. I don t know Yes, it will work in all cas 0% 0% 0% 0% No, it will not work in any c I don t know Lisa Bart Bridge WiFi Base Station with access control functions Campus Network With access control Servers 68

Bart, who is EPFL student, connects his PC to EPFL WiFi, which uses per user access control, authentication and encryption. Bart configures his PC to be a NAT between Ethernet and WiFi and allows Lisa, who is not allowed to access EPFL, to connect to his Ethernet port. Will Lisa be able to connect to the Internet in this way? 1. Yes if Bart himself is not behind a NAT 2. Yes 3. No, it will not work in any case 4. I don t know Yes if Bart himself is not b... 0% 0% 0% 0% Yes No, it will not work in any case I don t know Lisa Bart NAT WiFi Base Station with access control functions Campus Network With access control Servers 70

Conclusion 1 The MAC layer for wireless medium (WiFi) takes care of sharing the radio waves in a local environment. The MAC layer for wired medium (Ethernet) was originally designed for sharing a cable; in this form it uses a protocol, called CSMA/CD very similar to WiFi The MAC layer for wired medium (Ethernet) has now got rid of any protocol ( full duplex Ethernet ), using interconnected bridges. It thus forms an interconnection layer of local scope. 72

73 Conclusion 2 We have seen two mechanisms to interconnect devices: the network layer (with IP routers) and the MAC layer (with bridges). What are the differences? Bridges use routing tables that are not structured. A bridge must search the entire table for every packet. The table size and lookup time are prohibitive if network becomes very large. We prefer routers for large networks. Bridges are independent of whether IPv4 or IPv6 is used. They are plug and play and are independent of IP numbering plans.