Ethernet, VLAN, Ethernet Carrier Grade

Size: px
Start display at page:

Download "Ethernet, VLAN, Ethernet Carrier Grade"

Transcription

1 Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1

2 Point-to-Point vs. Broadcast Media Point-to-point PPP for dial-up access Point-to-point link between Ethernet switch and host Broadcast (shared wire or medium) Traditional Ethernet wireless LAN RTEL 2

3 Three Ways to Share the Media Channel partitioning MAC protocols: Divide channel into pieces: share channel efficiently and fairly at high load Inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node! Taking turns protocols: Passing a token for the right to transmit Eliminates empty slots without causing collisions Vulnerable to failures (e.g., failed node or lost token) Random access MAC protocols: allow collisions, and then recover Efficient at low load: single node can fully utilize channel High load: collision overhead RTEL 3

4 Channel Partitioning: TDMA TDMA: time division multiple access Access to channel in "rounds" Each station gets fixed length slot in each round Time-slot length is packet transmission time Unused slots go idle Example: 6-station LAN with slots 1, 3, and 4 RTEL 4

5 Channel Partitioning: FDMA FDMA: frequency division multiple access Channel spectrum divided into frequency bands Each station assigned fixed frequency band Unused transmission time in bands go idle Example: 6-station LAN with bands 1, 3, and 4 time frequency bands RTEL 5

6 Taking Turns MAC protocols Polling Master node invites slave nodes to transmit in turn Concerns: Polling overhead Latency Single point of failure (master) Token passing Control token passed from one node to next sequentially Token message Concerns: Token overhead Latency Single point of failure (token) RTEL 6

7 Random Access Protocols When node has packet to send Transmit at full channel data rate R. No a priori coordination among nodes Two or more transmitting nodes => collision, Random access MAC protocol specifies: How to detect collisions How to recover from collisions Examples ALOHA and Slotted ALOHA CSMA, CSMA/CD, CSMA/CA RTEL 7

8 Key Ideas of Random Access Carrier Sense (CS) Listen before speaking, and don t interrupt Checking if someone else is already sending data and waiting till the other node is done Collision Detection (CD) If someone else starts talking at the same time, stop Realizing when two nodes are transmitting at once by detecting that the data on the wire is garbled Randomness Don t start talking again right away Waiting for a random time before trying again RTEL 8

9 Slotted ALOHA Assumptions All frames same size Time divided into equal slots (time to transmit a frame) Nodes start to transmit frames only at start of slots Nodes are synchronized If two or more nodes transmit, all nodes detect collision Operation When node obtains fresh frame, transmits in next slot No collision: node can send new frame in next slot Collision: node retransmits frame in each subsequent slot with probability p until success RTEL 9

10 Slotted ALOHA Pros Single active node can continuously transmit at full rate of channel Highly decentralized: only slots in nodes need to be in sync Simple Cons Collisions, wasting slots Idle slots Nodes may be able to detect collision in less than time to transmit packet Clock synchronization RTEL 10

11 CSMA (Carrier Sense Multiple Access) Collisions hurt the efficiency of ALOHA protocol At best, channel is useful 37% of the time CSMA: listen before transmit If channel sensed idle: transmit entire frame If channel sensed busy, defer transmission Human analogy: don t interrupt others! RTEL 11

12 CSMA Collisions Collisions can still occur: propagation delay means two nodes may not hear each other s transmission Collision: entire packet transmission time wasted RTEL 12

13 CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA Collisions detected within short time Colliding transmissions aborted, reducing wastage Collision detection Easy in wired LANs: measure signal strengths, compare transmitted, received signals Difficult in wireless LANs: receiver shut off while transmitting Human analogy: the polite conversationalist RTEL 13

14 CSMA/CD Collision Detection RTEL 14

15 Ethernet Dominant wired LAN technology: First widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed race: 10 Mbps 10 Gbps Metcalfe s Ethernet sketch RTEL 15

16 Ethernet Uses CSMA/CD Carrier Sense: wait for link to be idle Channel idle: start transmitting Channel busy: wait until idle Collision Detection: listen while transmitting No collision: transmission is complete Collision: abort transmission, and send jam signal Random access: exponential back-off After collision, wait a random time before trying again After m th collision, choose K randomly from {0,, 2 n -1} ; n = min (m, 10) Wait for K*512 bit times before trying again (for Ethernet 10Mb/s, 512 bit times = 51.2 µs) The more collisions occured, the more the station may have to wait before attempting retransmission After 16 attempts, the station gives up its transmission RTEL 16

17 Shared Ethernet and max distance In 10Mbps Ethernet networks, the minimal Ethernet frame length is 64 bytes Why such a limitation? According to the CSMA/CD method, a station must listen to the medium while transmitting in order to detect collisions The frame has to be long enough With a fixed minimal frame length, the maximum distance between 2 stations on a shared network can be calculated. RTEL 17

18 Maximum Length in Ethernet A! B! latency d! If A emits a minimal frame, the emission lasts 51,2 µs In the worst case scenario B starts emitting just before receiving the first bit emitted by A A will know that a collision occured after a complete round trip between A and B 2 * t prop, with t prop = D AB / Speed Prop After a round trip time, A must still be emitting t trans 2*t prop With Speed Prop = km/s, D AB 5,12 km Imposes restrictions on Ethernet length M/D >= 2*L/V M: Minimum frame size : 64 bytes = 512 bits D: Transmission data rate L: Length of the network V: Signal propagation speed along the cable RTEL 18

19 Ethernet frame Bytes DA SA L/ T DATA FCS Bits OUI Device Id OUI: Organization Unique Id RTEL 19

20 Connecting L2&L3 : ARP The Address Resolution Protocol (ARP) -- the mechanisms for translating IP addresses to physical addresses and hide these physical addresses from the upper layers. How it works A requester takes an IP address and searches for a corresponding physical address in a mapping table. Address found, it returns the 48 bit address, such as a workstation or server on a LAN. Address not found, à ARP module sends a broadcast -- ARP request containing the IP address-- onto the network. The machine recognizing its IP returns an ARP reply to the inquiring host. The inquiring host places this address into the ARP cache. RTEL 20

21 Hubs: Physical-Layer Repeaters Hubs are physical-layer repeaters Bits coming from one link go out all other links At the same rate, with no frame buffering No CSMA/CD at hub: adapters detect collisions twisted pair hub RTEL 21

22 Interconnecting with Hubs Backbone hub interconnects LAN segments All packets seen everywhere, forming one large collision domain Can t interconnect Ethernets of different speeds hub hub hub hub RTEL 22

23 Bridge Link layer device Examines frame header and selectively forwards frame based on MAC dest address When frame is to be forwarded on segment, uses CSMA/CD to access segment Transparent Hosts are unaware of presence of bridges RTEL 23

24 Bridge: Traffic isolation Bridge breaks subnet into LAN segments Bridge filters packets Same-LAN-segment frames not usually forwarded onto other LAN segments Segments become separate collision domains Bridge collision domain hub hub hub collision domain collision domain RTEL 24

25 From a shared solution to a switched solution switch Ethernet switching: LAN segments contain only one station each, interconnecting with a switch Switches are Plug-and-play, self-learning (do not need to be configured) Speed: 10, 100 Mbps, 1, 10 and 100 Gbps No collision, no limitation of distance RTEL 25

26 Switched Ethernet Bridges and Ethernet switch are intelligent equipments Packet switching based on MAC destination address Allows VLAN management Each side of a bridge, or each port of a switch is an independent Ethernet network No distance limitation in switched networks Higher throughput (until 40 Gbps) Main difficulty : Each switch has to know the MAC address of every station on the whole network Frames may pile up in switches : flow control is necessary Pause frame RTEL 26

27 Ethernet switching 2 generations The old one: we use the Ethernet address as a label. The signaling technique is implicit. When an Ethernet switch receive a packet, it verifies that the switching table possesses a line with this label and the output interface. If there is no output line defining how to go to the destination the switch sends a multicast packet (ARP packet) to find where is the destination node and update its switching table. A B RTEL 27

28 Ethernet switching The new generation: A pure switching technique with a field transporting the label. The MPLS label is used as the reference for switching: this is the MPLS Ethernet forwarding. IP signaling What happens in case of link failure? With MAC address switching : sending of a multicast packet to find the station or a switch that knows where to forward the packet With MPLS Ethernet forwarding : Back up paths can be used RTEL 28

29 Virtual Local Area Network Network traffic consists of a high percentage of broadcasts and multicasts Reduce the need to send such traffic to unnecessary destinations Use VLAN VLAN is a broadcast domain Group of hosts (ports) on the switch with a common set of requirements Group of hosts communicate as if they were attached to the same wire VLAN has the same attributes as a physical LAN VLAN allows grouping to the end stations, services and devices, which do not need to locate on the same LAN segment Traffic can be switched between VLANs with a router RTEL 29

30 VLAN Operations VLAN has a switched network that is logically segmented Each switch port can be assigned to a VLAN Ports assigned to the same VLAN share broadcasts. Ports that do not belong to that VLAN do not share these broadcasts This improves network performance because unnecessary broadcasts are reduced RTEL 30

31 Difference of VLAN and LAN RTEL 31

32 How does it works? Switch receives data from a workstation, it tags the data with a VLAN identifier Tagging can be based on : The port from which it came (Layer 1 VLAN) The source Media Access Control (MAC) field (Layer 2 VLAN) The source network address (Layer 3 VLAN) Or some other field or combination of fields RTEL 32

33 Virtual networks (physical ports) VLAN 1: #1,3 STATION A STATION B STATION C VLAN 2: # 2,4, Switch A 4 STATION D STATION F RTEL 33

34 Virtual networks (MAC addresses) STATION A STATION B STATION C VLAN 1 Switch A STATION D Switch B STATION F3 VLAN 2 STATION F1 STATION F2 RTEL 34

35 VLAN Tagging First switch adds tag containing VLAN id to all incoming packets Intermediate switches do not recompute the VLAN id Last switch removes tags from all outgoing packets Tag is not swapped at every hop like VC Id or labels RTEL 35

36 Ethernet Frame for VLAN (IEEE 802.1Q) Octets CRC Octets Tag Protocol ID (TPID) : 0x8100 to identify the frame as a VLAN tagged frame. This value indicates to a L2 device that the frame has an 802.1Q tag. 3 priority bits 8 levels of priority from 0 (lowest) to 7 (highest) The priority bits are the reason why 802.1Q is often referred to as 802.1p/Q. CFI (Canonical Format Indicator): Bit order of address info in Token Ring / FDDI frames. Always set to zero for Ethernet switches. VLAN ID identify the VLAN (12 bits => 4094 different VLANs): A value of 0 means that the frame does not belong to any VLAN; in this case the 802.1Q tag specifies only a priority and is referred to as a priority tag. bits RTEL 36

37 Ethernet Carrier Grade Characteristics of Carrier Grade: Scalability: billons of users Availability Five«9» = 99,999 pourcentage of availability Time before re-establising a session SONET/SDH : 50 ms n:m:l technology (n paths backuped by m path, backuped by l paths) «Hard» QoS: Strong guaranty on some services How to add these guaranties to get a carrier grade Ethernet? RTEL 37

38 Reference Provider Transport Architecture PE Provider Network PE RB CE CE CE Customer Network CE RB Customer Network Regular bridges PE: Provider Edge CE: Customer Edge

39 Ethernet Carrier Grade Three solutions: MPLS Ethernet forwarding MEF (Metro Ethernet Forum) Ethernet GVLAN (Generalized VLAN) A VLAN may correspond to a path establishment if point to point VLAN may allow QoS with traffic monitoring, but the number of possible VLAN is too small (4094) for scalability RTEL 39

40 1 st solution : MPLS Ethernet forwarding IP signaling to open a path (LSP) Label all along the path (MPLS Label or Shim Label) Ethernet switching along the path RTEL 40

41 2nd solution : Metro Ethernet Forum (MEF) MEF (founded in 2001), international industry consortium, dedicated to worldwide adoption of Carrier Ethernet networks and services. Composed of leading service providers, network equipment vendors, and other networking compagnies. It had 160 members as of Feb MEF : Metro Ethernet Forum RTEL 41

42 3rd solution: Ethernet Carrier Grade Q-tag (defined in IEEE 802.1Q) allowing to define VLAN Management and performance are improved Three solutions for this approach: IEEE 802.1ad : known as Q-in-Q, stacked VLANs or Provider Bridging, that extend the first definition of VLAN. Creation of a VLAN field for the service provider Service provider can only use 4094 VLANs, still insufficient IEEE 802.1ah : known as MAC-in-MAC, or Provider Backbone Bridge Client MAC is encapsulated in the service provider MAC address The operator only needs to know its own MAC to switch the frame Provider Backbone Transport (PBT) : Creation of a MPLS tunnel MPLS references corresponds to the network ends MPLS allows much larger VLAN differentiation: add a 48 bit reference => total = 72 bits VLAN identifier. RTEL 42

43 Q-in-Q (802.1ad) DA SA DA SA DA SA Payload VID Payload S-VID C-VID 802.1q SA: Source Address DA: Destination address VID: VLAN ID (802.1q Tag) S-VID: Service VID (802.1q Outer Tag or Metro Tag) C-VID: Customer VID (802.1q Inner Tag) Payload 802.1ad RTEL 43

44 3rd solution: Ethernet Carrier Grade Q-tag (defined in IEEE 802.1Q) allowing to define VLAN Management and performance are improved Three solutions for this approach: IEEE 802.1ad : known as Q-in-Q, stacked VLANs or Provider Bridging, that extend the first definition of VLAN. Creation of a VLAN field for the service provider Service provider can only use 4094 VLANs, still insufficient IEEE 802.1ah : known as MAC-in-MAC, or Provider Backbone Bridge Client MAC is encapsulated in the service provider MAC address The operator only needs to know its own MAC to switch the frame Provider Backbone Transport (PBT) : Creation of a MPLS tunnel MPLS references corresponds to the network ends MPLS allows much larger VLAN differentiation: add a 48 bit reference => total = 72 bits VLAN identifier. RTEL 44

45 MAC-in-MAC (802.1ah) DA SA Payload SA: Source Address DA: Destination address VID: VLAN ID S-VID: Service VID C-VID: Customer VID B-SA: Backbone SA B-DA: Backbone DA B-VID: Backbone VID I-SID: Service Instance ID DA SA VID Payload 802.1q DA SA S-VID C-VID Payload 802.1ad B-DA B-SA B-VID I-SID DA SA S-VID C-VID Payload 802.1ah RTEL 45

46 3rd solution: Ethernet Carrier Grade Q-tag (defined in IEEE 802.1Q) allowing to define VLAN Management and performance are improved Three solutions for this approach: IEEE 802.1ad : known as Q-in-Q, stacked VLANs or Provider Bridging, that extend the first definition of VLAN. Creation of a VLAN field for the service provider Service provider can only use 4094 VLANs, still insufficient IEEE 802.1ah : known as MAC-in-MAC, or Provider Backbone Bridge Client MAC is encapsulated in the service provider MAC address The operator only needs to know its own MAC to switch the frame Provider Backbone Transport (PBT) : Creation of a MPLS tunnel MPLS references corresponds to the network ends MPLS allows much larger VLAN differentiation: add a 48 bit reference => total = 72 bits VLAN identifier. RTEL 46

47 PBT DA SA Payload SA: Source Address DA: Destination address VID: VLAN ID S-VID: Service VID C-VID: Customer VID B-SA: Backbone SA B-DA: Backbone DA B-VID: Backbone VID MPLS-SL: Service Label DA SA VID Payload 802.1q DA SA S-VID C-VID Payload 802.1ad B-DA B-SA B-VID MPLS-SL DA SA S-VID C-VID Payload PBT RTEL 47

Random Access Protocols

Random Access Protocols Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

Lecture 7 Multiple Access Protocols and Wireless

Lecture 7 Multiple Access Protocols and Wireless Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information

Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain

Virtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain Virtual LANs Professor of Computer and Information Sciences Please download and print the handouts from: http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

More information

Resiliency in Ethernet Based Transport Networks

Resiliency in Ethernet Based Transport Networks Resiliency in Ethernet Based Transport Networks Kari Seppänen Kari.Seppanen@vtt.fi Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Controlled Random Access Methods

Controlled Random Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

More information

VLAN and QinQ Technology White Paper

VLAN and QinQ Technology White Paper VLAN and QinQ Technology White Paper Issue 1.01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

RTT 60.5 msec receiver window size: 32 KB

RTT 60.5 msec receiver window size: 32 KB Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

How To Make A Network Cable Reliable And Secure

How To Make A Network Cable Reliable And Secure ETHERNET KEPT Provider Link State Bridging Gerard Jacobs Senior Solutions Architect Agenda > Network Visions > Carrier Ethernet > Provider Link State Bridging (PLSB) > Summary Network Visions HYBRID L1

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

Data Link Layer. Page 1. Ethernet

Data Link Layer. Page 1. Ethernet Sicherungsebene Network Categories Local Area Networks (LAN): 10m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

An Introduction to Open vswitch

An Introduction to Open vswitch An Introduction to Open vswitch Netfilter Workshop, Seville, Spain Simon Horman Horms Solutions Ltd., Tokyo October 2010 Open vswitch Server Open vswitch Datapath Open vswitch Controller

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for

More information

Gigabit Ethernet: Architectural Design and Issues

Gigabit Ethernet: Architectural Design and Issues Gigabit Ethernet: Architectural Design and Issues Professor of Computer and Information Sciences Columbus, OH 43210 http://www.cis.ohio-state.edu/~jain/ 9-1 Overview Distance-Bandwidth Principle 10 Mbps

More information

Understanding PBB-TE for Carrier Ethernet

Understanding PBB-TE for Carrier Ethernet Understanding PBB-TE for Carrier Ethernet Introduction Ethernet is evolving from an enterprise LAN technology to a much more robust, carrier-grade transport technology for metropolitan service networks.

More information

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access Sicherungsebene Network Categories Local Area Networks (LAN): 0m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

More information

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2 1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay

More information

enetworks TM IP Quality of Service B.1 Overview of IP Prioritization

enetworks TM IP Quality of Service B.1 Overview of IP Prioritization encor! enetworks TM Version A, March 2008 2010 Encore Networks, Inc. All rights reserved. IP Quality of Service The IP Quality of Service (QoS) feature allows you to assign packets a level of priority

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

CS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - IP addressing; 21 st Aug 2012 Instructor: Sridhar Iyer IIT Bombay Think-Pair-Share: IP addressing What is the need for IP addresses? Why not have only MAC addresses? Given that

More information

Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture

Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Paul Bottorff Version 1.0 July 12, 2004 Page 1 A Provider Bridge Scaling Solution Backbone Provider Bridging 802.1ad

More information

Overview of Routing between Virtual LANs

Overview of Routing between Virtual LANs Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information

More information

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services

Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services Introduction Recently, a number of technologies have emerged for transporting Carrier Ethernet services. One such technology,

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

From Fieldbus to toreal Time Ethernet

From Fieldbus to toreal Time Ethernet Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Implementation of Virtual Local Area Network using network simulator

Implementation of Virtual Local Area Network using network simulator 1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,

More information

How To Configure Voice Vlan On An Ip Phone

How To Configure Voice Vlan On An Ip Phone 1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices

More information

CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module

CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module

More information

SSVVP SIP School VVoIP Professional Certification

SSVVP SIP School VVoIP Professional Certification SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that

More information

Advanced features on Ethernet networks. Fulvio Risso Politecnico di Torino

Advanced features on Ethernet networks. Fulvio Risso Politecnico di Torino Advanced features on Ethernet networks Fulvio Risso Politecnico di Torino 1 Outline Autonegotiation Jumbo frames Power Over Ethernet (PoE) 3 Auto negotiation (1) Another plug-and-play oriented feature

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

What is VLAN Routing?

What is VLAN Routing? Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one

More information

Shortest Path Bridging IEEE 802.1aq Overview

Shortest Path Bridging IEEE 802.1aq Overview Shortest Path Bridging IEEE 802.1aq Overview Don Fedyk IEEE Editor 802.1aq Alcatel-Lucent IPD Product Manager Monday, 12 July 2010 Abstract 802.1aq Shortest Path Bridging is being standardized by the IEEE

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF Gigabit Ethernet MAC (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF 1. INTRODUCTION This document serves as a product info for the Gigabit Ethernet MAC from Hitek Systems. The core supports

More information

Networking 4 Voice and Video over IP (VVoIP)

Networking 4 Voice and Video over IP (VVoIP) Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move

More information

Real-Time (Paradigms) (51)

Real-Time (Paradigms) (51) Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

More information

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the

More information

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NWORK SERVICES A Major CCTV network and surveilance services provider chose Senetas certified high-speed encryptors to protect European law enforcement CCTV network

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection: Data Link Protocols Link Layer Services Framing, Addressing, link access: encapsulate datagram into frame, adding header, trailer channel access if shared medium MAC addresses used in frame headers to

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

LAN Switching and VLANs

LAN Switching and VLANs 26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview 2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail sales@comtechefdata.com Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014

More information

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale

802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale 802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to

More information

The IP Transmission Process. V1.4: Geoff Bennett

The IP Transmission Process. V1.4: Geoff Bennett The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks

More information

network infrastructure: getting started with VoIP

network infrastructure: getting started with VoIP hp procurve networking business may 2003 network infrastructure: getting started with VoIP technical brief table of contents introduction 2 network optimization for VoIP 2 bandwidth provisioning 3 end-to-end

More information

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Introduction to IP v6

Introduction to IP v6 IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation

More information

Cloud Infrastructure Planning. Chapter Six

Cloud Infrastructure Planning. Chapter Six Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and

More information

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse Chapter 4 Medium Access Control 1 Introduction Objectives To manage the access to the medium or channel To take into account the time constraints To schedule the traffics Different solutions History Different

More information

TRILL for Data Center Networks

TRILL for Data Center Networks 24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

How To Communicate With A Token Ring Network (Dihon)

How To Communicate With A Token Ring Network (Dihon) Token us Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. One example for a ken network: IEEE 80. Token us All stations should be treated equally, i.e. they have pass

More information

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1 Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber

More information

Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA

Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA Riverstone Networks Carrier Ethernet Standards Progress Igor Giangrossi Sr. Systems Engineer, CALA Agenda History Metro Ethernet Forum work IETF work IEEE work Conclusion 2 Ethernet Evolution What do we

More information