Ethernet, VLAN, Ethernet Carrier Grade
|
|
- Horatio Webb
- 8 years ago
- Views:
Transcription
1 Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1
2 Point-to-Point vs. Broadcast Media Point-to-point PPP for dial-up access Point-to-point link between Ethernet switch and host Broadcast (shared wire or medium) Traditional Ethernet wireless LAN RTEL 2
3 Three Ways to Share the Media Channel partitioning MAC protocols: Divide channel into pieces: share channel efficiently and fairly at high load Inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node! Taking turns protocols: Passing a token for the right to transmit Eliminates empty slots without causing collisions Vulnerable to failures (e.g., failed node or lost token) Random access MAC protocols: allow collisions, and then recover Efficient at low load: single node can fully utilize channel High load: collision overhead RTEL 3
4 Channel Partitioning: TDMA TDMA: time division multiple access Access to channel in "rounds" Each station gets fixed length slot in each round Time-slot length is packet transmission time Unused slots go idle Example: 6-station LAN with slots 1, 3, and 4 RTEL 4
5 Channel Partitioning: FDMA FDMA: frequency division multiple access Channel spectrum divided into frequency bands Each station assigned fixed frequency band Unused transmission time in bands go idle Example: 6-station LAN with bands 1, 3, and 4 time frequency bands RTEL 5
6 Taking Turns MAC protocols Polling Master node invites slave nodes to transmit in turn Concerns: Polling overhead Latency Single point of failure (master) Token passing Control token passed from one node to next sequentially Token message Concerns: Token overhead Latency Single point of failure (token) RTEL 6
7 Random Access Protocols When node has packet to send Transmit at full channel data rate R. No a priori coordination among nodes Two or more transmitting nodes => collision, Random access MAC protocol specifies: How to detect collisions How to recover from collisions Examples ALOHA and Slotted ALOHA CSMA, CSMA/CD, CSMA/CA RTEL 7
8 Key Ideas of Random Access Carrier Sense (CS) Listen before speaking, and don t interrupt Checking if someone else is already sending data and waiting till the other node is done Collision Detection (CD) If someone else starts talking at the same time, stop Realizing when two nodes are transmitting at once by detecting that the data on the wire is garbled Randomness Don t start talking again right away Waiting for a random time before trying again RTEL 8
9 Slotted ALOHA Assumptions All frames same size Time divided into equal slots (time to transmit a frame) Nodes start to transmit frames only at start of slots Nodes are synchronized If two or more nodes transmit, all nodes detect collision Operation When node obtains fresh frame, transmits in next slot No collision: node can send new frame in next slot Collision: node retransmits frame in each subsequent slot with probability p until success RTEL 9
10 Slotted ALOHA Pros Single active node can continuously transmit at full rate of channel Highly decentralized: only slots in nodes need to be in sync Simple Cons Collisions, wasting slots Idle slots Nodes may be able to detect collision in less than time to transmit packet Clock synchronization RTEL 10
11 CSMA (Carrier Sense Multiple Access) Collisions hurt the efficiency of ALOHA protocol At best, channel is useful 37% of the time CSMA: listen before transmit If channel sensed idle: transmit entire frame If channel sensed busy, defer transmission Human analogy: don t interrupt others! RTEL 11
12 CSMA Collisions Collisions can still occur: propagation delay means two nodes may not hear each other s transmission Collision: entire packet transmission time wasted RTEL 12
13 CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA Collisions detected within short time Colliding transmissions aborted, reducing wastage Collision detection Easy in wired LANs: measure signal strengths, compare transmitted, received signals Difficult in wireless LANs: receiver shut off while transmitting Human analogy: the polite conversationalist RTEL 13
14 CSMA/CD Collision Detection RTEL 14
15 Ethernet Dominant wired LAN technology: First widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed race: 10 Mbps 10 Gbps Metcalfe s Ethernet sketch RTEL 15
16 Ethernet Uses CSMA/CD Carrier Sense: wait for link to be idle Channel idle: start transmitting Channel busy: wait until idle Collision Detection: listen while transmitting No collision: transmission is complete Collision: abort transmission, and send jam signal Random access: exponential back-off After collision, wait a random time before trying again After m th collision, choose K randomly from {0,, 2 n -1} ; n = min (m, 10) Wait for K*512 bit times before trying again (for Ethernet 10Mb/s, 512 bit times = 51.2 µs) The more collisions occured, the more the station may have to wait before attempting retransmission After 16 attempts, the station gives up its transmission RTEL 16
17 Shared Ethernet and max distance In 10Mbps Ethernet networks, the minimal Ethernet frame length is 64 bytes Why such a limitation? According to the CSMA/CD method, a station must listen to the medium while transmitting in order to detect collisions The frame has to be long enough With a fixed minimal frame length, the maximum distance between 2 stations on a shared network can be calculated. RTEL 17
18 Maximum Length in Ethernet A! B! latency d! If A emits a minimal frame, the emission lasts 51,2 µs In the worst case scenario B starts emitting just before receiving the first bit emitted by A A will know that a collision occured after a complete round trip between A and B 2 * t prop, with t prop = D AB / Speed Prop After a round trip time, A must still be emitting t trans 2*t prop With Speed Prop = km/s, D AB 5,12 km Imposes restrictions on Ethernet length M/D >= 2*L/V M: Minimum frame size : 64 bytes = 512 bits D: Transmission data rate L: Length of the network V: Signal propagation speed along the cable RTEL 18
19 Ethernet frame Bytes DA SA L/ T DATA FCS Bits OUI Device Id OUI: Organization Unique Id RTEL 19
20 Connecting L2&L3 : ARP The Address Resolution Protocol (ARP) -- the mechanisms for translating IP addresses to physical addresses and hide these physical addresses from the upper layers. How it works A requester takes an IP address and searches for a corresponding physical address in a mapping table. Address found, it returns the 48 bit address, such as a workstation or server on a LAN. Address not found, à ARP module sends a broadcast -- ARP request containing the IP address-- onto the network. The machine recognizing its IP returns an ARP reply to the inquiring host. The inquiring host places this address into the ARP cache. RTEL 20
21 Hubs: Physical-Layer Repeaters Hubs are physical-layer repeaters Bits coming from one link go out all other links At the same rate, with no frame buffering No CSMA/CD at hub: adapters detect collisions twisted pair hub RTEL 21
22 Interconnecting with Hubs Backbone hub interconnects LAN segments All packets seen everywhere, forming one large collision domain Can t interconnect Ethernets of different speeds hub hub hub hub RTEL 22
23 Bridge Link layer device Examines frame header and selectively forwards frame based on MAC dest address When frame is to be forwarded on segment, uses CSMA/CD to access segment Transparent Hosts are unaware of presence of bridges RTEL 23
24 Bridge: Traffic isolation Bridge breaks subnet into LAN segments Bridge filters packets Same-LAN-segment frames not usually forwarded onto other LAN segments Segments become separate collision domains Bridge collision domain hub hub hub collision domain collision domain RTEL 24
25 From a shared solution to a switched solution switch Ethernet switching: LAN segments contain only one station each, interconnecting with a switch Switches are Plug-and-play, self-learning (do not need to be configured) Speed: 10, 100 Mbps, 1, 10 and 100 Gbps No collision, no limitation of distance RTEL 25
26 Switched Ethernet Bridges and Ethernet switch are intelligent equipments Packet switching based on MAC destination address Allows VLAN management Each side of a bridge, or each port of a switch is an independent Ethernet network No distance limitation in switched networks Higher throughput (until 40 Gbps) Main difficulty : Each switch has to know the MAC address of every station on the whole network Frames may pile up in switches : flow control is necessary Pause frame RTEL 26
27 Ethernet switching 2 generations The old one: we use the Ethernet address as a label. The signaling technique is implicit. When an Ethernet switch receive a packet, it verifies that the switching table possesses a line with this label and the output interface. If there is no output line defining how to go to the destination the switch sends a multicast packet (ARP packet) to find where is the destination node and update its switching table. A B RTEL 27
28 Ethernet switching The new generation: A pure switching technique with a field transporting the label. The MPLS label is used as the reference for switching: this is the MPLS Ethernet forwarding. IP signaling What happens in case of link failure? With MAC address switching : sending of a multicast packet to find the station or a switch that knows where to forward the packet With MPLS Ethernet forwarding : Back up paths can be used RTEL 28
29 Virtual Local Area Network Network traffic consists of a high percentage of broadcasts and multicasts Reduce the need to send such traffic to unnecessary destinations Use VLAN VLAN is a broadcast domain Group of hosts (ports) on the switch with a common set of requirements Group of hosts communicate as if they were attached to the same wire VLAN has the same attributes as a physical LAN VLAN allows grouping to the end stations, services and devices, which do not need to locate on the same LAN segment Traffic can be switched between VLANs with a router RTEL 29
30 VLAN Operations VLAN has a switched network that is logically segmented Each switch port can be assigned to a VLAN Ports assigned to the same VLAN share broadcasts. Ports that do not belong to that VLAN do not share these broadcasts This improves network performance because unnecessary broadcasts are reduced RTEL 30
31 Difference of VLAN and LAN RTEL 31
32 How does it works? Switch receives data from a workstation, it tags the data with a VLAN identifier Tagging can be based on : The port from which it came (Layer 1 VLAN) The source Media Access Control (MAC) field (Layer 2 VLAN) The source network address (Layer 3 VLAN) Or some other field or combination of fields RTEL 32
33 Virtual networks (physical ports) VLAN 1: #1,3 STATION A STATION B STATION C VLAN 2: # 2,4, Switch A 4 STATION D STATION F RTEL 33
34 Virtual networks (MAC addresses) STATION A STATION B STATION C VLAN 1 Switch A STATION D Switch B STATION F3 VLAN 2 STATION F1 STATION F2 RTEL 34
35 VLAN Tagging First switch adds tag containing VLAN id to all incoming packets Intermediate switches do not recompute the VLAN id Last switch removes tags from all outgoing packets Tag is not swapped at every hop like VC Id or labels RTEL 35
36 Ethernet Frame for VLAN (IEEE 802.1Q) Octets CRC Octets Tag Protocol ID (TPID) : 0x8100 to identify the frame as a VLAN tagged frame. This value indicates to a L2 device that the frame has an 802.1Q tag. 3 priority bits 8 levels of priority from 0 (lowest) to 7 (highest) The priority bits are the reason why 802.1Q is often referred to as 802.1p/Q. CFI (Canonical Format Indicator): Bit order of address info in Token Ring / FDDI frames. Always set to zero for Ethernet switches. VLAN ID identify the VLAN (12 bits => 4094 different VLANs): A value of 0 means that the frame does not belong to any VLAN; in this case the 802.1Q tag specifies only a priority and is referred to as a priority tag. bits RTEL 36
37 Ethernet Carrier Grade Characteristics of Carrier Grade: Scalability: billons of users Availability Five«9» = 99,999 pourcentage of availability Time before re-establising a session SONET/SDH : 50 ms n:m:l technology (n paths backuped by m path, backuped by l paths) «Hard» QoS: Strong guaranty on some services How to add these guaranties to get a carrier grade Ethernet? RTEL 37
38 Reference Provider Transport Architecture PE Provider Network PE RB CE CE CE Customer Network CE RB Customer Network Regular bridges PE: Provider Edge CE: Customer Edge
39 Ethernet Carrier Grade Three solutions: MPLS Ethernet forwarding MEF (Metro Ethernet Forum) Ethernet GVLAN (Generalized VLAN) A VLAN may correspond to a path establishment if point to point VLAN may allow QoS with traffic monitoring, but the number of possible VLAN is too small (4094) for scalability RTEL 39
40 1 st solution : MPLS Ethernet forwarding IP signaling to open a path (LSP) Label all along the path (MPLS Label or Shim Label) Ethernet switching along the path RTEL 40
41 2nd solution : Metro Ethernet Forum (MEF) MEF (founded in 2001), international industry consortium, dedicated to worldwide adoption of Carrier Ethernet networks and services. Composed of leading service providers, network equipment vendors, and other networking compagnies. It had 160 members as of Feb MEF : Metro Ethernet Forum RTEL 41
42 3rd solution: Ethernet Carrier Grade Q-tag (defined in IEEE 802.1Q) allowing to define VLAN Management and performance are improved Three solutions for this approach: IEEE 802.1ad : known as Q-in-Q, stacked VLANs or Provider Bridging, that extend the first definition of VLAN. Creation of a VLAN field for the service provider Service provider can only use 4094 VLANs, still insufficient IEEE 802.1ah : known as MAC-in-MAC, or Provider Backbone Bridge Client MAC is encapsulated in the service provider MAC address The operator only needs to know its own MAC to switch the frame Provider Backbone Transport (PBT) : Creation of a MPLS tunnel MPLS references corresponds to the network ends MPLS allows much larger VLAN differentiation: add a 48 bit reference => total = 72 bits VLAN identifier. RTEL 42
43 Q-in-Q (802.1ad) DA SA DA SA DA SA Payload VID Payload S-VID C-VID 802.1q SA: Source Address DA: Destination address VID: VLAN ID (802.1q Tag) S-VID: Service VID (802.1q Outer Tag or Metro Tag) C-VID: Customer VID (802.1q Inner Tag) Payload 802.1ad RTEL 43
44 3rd solution: Ethernet Carrier Grade Q-tag (defined in IEEE 802.1Q) allowing to define VLAN Management and performance are improved Three solutions for this approach: IEEE 802.1ad : known as Q-in-Q, stacked VLANs or Provider Bridging, that extend the first definition of VLAN. Creation of a VLAN field for the service provider Service provider can only use 4094 VLANs, still insufficient IEEE 802.1ah : known as MAC-in-MAC, or Provider Backbone Bridge Client MAC is encapsulated in the service provider MAC address The operator only needs to know its own MAC to switch the frame Provider Backbone Transport (PBT) : Creation of a MPLS tunnel MPLS references corresponds to the network ends MPLS allows much larger VLAN differentiation: add a 48 bit reference => total = 72 bits VLAN identifier. RTEL 44
45 MAC-in-MAC (802.1ah) DA SA Payload SA: Source Address DA: Destination address VID: VLAN ID S-VID: Service VID C-VID: Customer VID B-SA: Backbone SA B-DA: Backbone DA B-VID: Backbone VID I-SID: Service Instance ID DA SA VID Payload 802.1q DA SA S-VID C-VID Payload 802.1ad B-DA B-SA B-VID I-SID DA SA S-VID C-VID Payload 802.1ah RTEL 45
46 3rd solution: Ethernet Carrier Grade Q-tag (defined in IEEE 802.1Q) allowing to define VLAN Management and performance are improved Three solutions for this approach: IEEE 802.1ad : known as Q-in-Q, stacked VLANs or Provider Bridging, that extend the first definition of VLAN. Creation of a VLAN field for the service provider Service provider can only use 4094 VLANs, still insufficient IEEE 802.1ah : known as MAC-in-MAC, or Provider Backbone Bridge Client MAC is encapsulated in the service provider MAC address The operator only needs to know its own MAC to switch the frame Provider Backbone Transport (PBT) : Creation of a MPLS tunnel MPLS references corresponds to the network ends MPLS allows much larger VLAN differentiation: add a 48 bit reference => total = 72 bits VLAN identifier. RTEL 46
47 PBT DA SA Payload SA: Source Address DA: Destination address VID: VLAN ID S-VID: Service VID C-VID: Customer VID B-SA: Backbone SA B-DA: Backbone DA B-VID: Backbone VID MPLS-SL: Service Label DA SA VID Payload 802.1q DA SA S-VID C-VID Payload 802.1ad B-DA B-SA B-VID MPLS-SL DA SA S-VID C-VID Payload PBT RTEL 47
Random Access Protocols
Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationEECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationLecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationAPPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW
PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,
More informationCS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
More informationVirtual LANs. http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/ Raj Jain
Virtual LANs Professor of Computer and Information Sciences Please download and print the handouts from: http://www.cis.ohio-state.edu/~jain/cis788-97/ or http://www.netlab.ohio-state.edu/~jain/cis788-97/
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationUnit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009
Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical
More informationResiliency in Ethernet Based Transport Networks
Resiliency in Ethernet Based Transport Networks Kari Seppänen Kari.Seppanen@vtt.fi Outline Introduction What is switched Ethernet? Legacy Ethernet Security and Reliability issues Rapid spanning tree protocol
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationControlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation
More informationVLAN and QinQ Technology White Paper
VLAN and QinQ Technology White Paper Issue 1.01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationRing Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationQoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)
QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationRohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationRTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
More informationTCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationUPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationHow To Make A Network Cable Reliable And Secure
ETHERNET KEPT Provider Link State Bridging Gerard Jacobs Senior Solutions Architect Agenda > Network Visions > Carrier Ethernet > Provider Link State Bridging (PLSB) > Summary Network Visions HYBRID L1
More informationLink Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS
Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and
More informationData Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More information11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
More informationData Link Layer. Page 1. Ethernet
Sicherungsebene Network Categories Local Area Networks (LAN): 10m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationCollision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationVLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
More informationAn Introduction to Open vswitch
An Introduction to Open vswitch Netfilter Workshop, Seville, Spain Simon Horman Horms Solutions Ltd., Tokyo October 2010 Open vswitch Server Open vswitch Datapath Open vswitch Controller
More informationOverview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
More informationGigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet
Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for
More informationGigabit Ethernet: Architectural Design and Issues
Gigabit Ethernet: Architectural Design and Issues Professor of Computer and Information Sciences Columbus, OH 43210 http://www.cis.ohio-state.edu/~jain/ 9-1 Overview Distance-Bandwidth Principle 10 Mbps
More informationUnderstanding PBB-TE for Carrier Ethernet
Understanding PBB-TE for Carrier Ethernet Introduction Ethernet is evolving from an enterprise LAN technology to a much more robust, carrier-grade transport technology for metropolitan service networks.
More informationNetwork Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access
Sicherungsebene Network Categories Local Area Networks (LAN): 0m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few
More informationISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2
1 ISTANBUL 1.1 MPLS overview 1 1.1.1 Principle Use of a ATM core network 2 Overlay Network One Virtual Circuit per communication No routing protocol Scalability problem 2 1.1.1 Principle Weakness of overlay
More informationenetworks TM IP Quality of Service B.1 Overview of IP Prioritization
encor! enetworks TM Version A, March 2008 2010 Encore Networks, Inc. All rights reserved. IP Quality of Service The IP Quality of Service (QoS) feature allows you to assign packets a level of priority
More information- Hubs vs. Switches vs. Routers -
1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing
More informationCS 348: Computer Networks. - IP addressing; 21 st Aug 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - IP addressing; 21 st Aug 2012 Instructor: Sridhar Iyer IIT Bombay Think-Pair-Share: IP addressing What is the need for IP addresses? Why not have only MAC addresses? Given that
More informationBackbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture
Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture Paul Bottorff Version 1.0 July 12, 2004 Page 1 A Provider Bridge Scaling Solution Backbone Provider Bridging 802.1ad
More informationOverview of Routing between Virtual LANs
Overview of Routing between Virtual LANs This chapter provides an overview of virtual LANs (VLANs). It describes the encapsulation protocols used for routing between VLANs and provides some basic information
More informationETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationProvider Backbone Bridging Traffic Engineering of Carrier Ethernet Services
Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services Introduction Recently, a number of technologies have emerged for transporting Carrier Ethernet services. One such technology,
More informationVXLAN: Scaling Data Center Capacity. White Paper
VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationFrom Fieldbus to toreal Time Ethernet
Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation
More informationComputer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationOverview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
More informationImplementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
More informationHow To Configure Voice Vlan On An Ip Phone
1 VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through software instead of physically relocating devices
More informationCMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module
CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module
More informationSSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
More informationAdvanced features on Ethernet networks. Fulvio Risso Politecnico di Torino
Advanced features on Ethernet networks Fulvio Risso Politecnico di Torino 1 Outline Autonegotiation Jumbo frames Power Over Ethernet (PoE) 3 Auto negotiation (1) Another plug-and-play oriented feature
More informationCommunications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
More informationWhat is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
More informationShortest Path Bridging IEEE 802.1aq Overview
Shortest Path Bridging IEEE 802.1aq Overview Don Fedyk IEEE Editor 802.1aq Alcatel-Lucent IPD Product Manager Monday, 12 July 2010 Abstract 802.1aq Shortest Path Bridging is being standardized by the IEEE
More informationOperating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
More informationCommunication Systems Internetworking (Bridges & Co)
Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de
More informationChapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
More informationGigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF
Gigabit Ethernet MAC (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF 1. INTRODUCTION This document serves as a product info for the Gigabit Ethernet MAC from Hitek Systems. The core supports
More informationNetworking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
More informationReal-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
More informationEXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols
EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate
More informationLevel 2 Routing: LAN Bridges and Switches
Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense
More informationChapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
More informationAPPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing
MPLS BASICS AND TESTING NEEDS By Thierno Diallo, Product Specialist Protocol Business Unit The continuing expansion and popularity of the Internet is forcing routers in the core network to support the
More informationNATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES
NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NWORK SERVICES A Major CCTV network and surveilance services provider chose Senetas certified high-speed encryptors to protect European law enforcement CCTV network
More informationECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
More informationData Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:
Data Link Protocols Link Layer Services Framing, Addressing, link access: encapsulate datagram into frame, adding header, trailer channel access if shared medium MAC addresses used in frame headers to
More informationQuality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationLAN Switching and VLANs
26 CHAPTER Chapter Goals Understand the relationship of LAN switching to legacy internetworking devices such as bridges and routers. Understand the advantages of VLANs. Know the difference between access
More informationFinal Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
More informationAdvanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview
2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail sales@comtechefdata.com Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014
More information802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
More informationThe IP Transmission Process. V1.4: Geoff Bennett
The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks
More informationnetwork infrastructure: getting started with VoIP
hp procurve networking business may 2003 network infrastructure: getting started with VoIP technical brief table of contents introduction 2 network optimization for VoIP 2 bandwidth provisioning 3 end-to-end
More informationOVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS
OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS Matt Eclavea (meclavea@brocade.com) Senior Solutions Architect, Brocade Communications Inc. Jim Allen (jallen@llnw.com) Senior Architect, Limelight
More informationNote! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
More informationIntroduction to IP v6
IP v 1-3: defined and replaced Introduction to IP v6 IP v4 - current version; 20 years old IP v5 - streams protocol IP v6 - replacement for IP v4 During developments it was called IPng - Next Generation
More informationCloud Infrastructure Planning. Chapter Six
Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and
More informationChapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse
Chapter 4 Medium Access Control 1 Introduction Objectives To manage the access to the medium or channel To take into account the time constraints To schedule the traffics Different solutions History Different
More informationTRILL for Data Center Networks
24.05.13 TRILL for Data Center Networks www.huawei.com enterprise.huawei.com Davis Wu Deputy Director of Switzerland Enterprise Group E-mail: wuhuajun@huawei.com Tel: 0041-798658759 Agenda 1 TRILL Overview
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationHow To Communicate With A Token Ring Network (Dihon)
Token us Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. One example for a ken network: IEEE 80. Token us All stations should be treated equally, i.e. they have pass
More informationLocal Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1
Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber
More informationRiverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA
Riverstone Networks Carrier Ethernet Standards Progress Igor Giangrossi Sr. Systems Engineer, CALA Agenda History Metro Ethernet Forum work IETF work IEEE work Conclusion 2 Ethernet Evolution What do we
More information