LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs



Similar documents
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Based on Computer Networking, 4 th Edition by Kurose and Ross

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

... neither PCF nor CA used in practice

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

CSMA/CA. Information Networks p. 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Wiereless LAN

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

11/22/

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

ECE/CS 372 introduction to computer networks. Lecture 13

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Communication Systems Internetworking (Bridges & Co)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

10. Wireless Networks

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

WAN Data Link Protocols

RTT 60.5 msec receiver window size: 32 KB

CSE 123A Computer Networks

- Hubs vs. Switches vs. Routers -

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Ethernet, VLAN, Ethernet Carrier Grade

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Level 2 Routing: LAN Bridges and Switches

LAN Switching and VLANs

Chapter 2 - The TCP/IP and OSI Networking Models

Lecture 7 Multiple Access Protocols and Wireless

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

DATA COMMUNICATION AND NETWORKS

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Howstuffworks "How LAN Switches Work" Click here to go back to the normal view!

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Network Layer: Network Layer and IP Protocol

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

SSVP SIP School VoIP Professional Certification

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Chapter 7 Low-Speed Wireless Local Area Networks

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Performance Analysis of Switches in High Speed LAN

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Data Center Networks, Link Layer Wireless (802.11)

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

IEEE Wireless LAN Standard. Updated: 5/10/2011

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

Performance Evaluation of Linux Bridge

Overview of Routing between Virtual LANs

High-Level Data Link Control

Data Communication and Computer Network

Exhibit n.2: The layers of a hierarchical network

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Chapter 1 Reading Organizer

Controlled Random Access Methods

CORPORATE NETWORKING

WIRELESS ETHERNET (IEEE )

Ethernet (LAN switching)

COMP 3331/9331: Computer Networks and Applications

Introduction to Ethernet

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

Network Design. Yiannos Mylonas

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Lecture 17: Wireless Networking"

Computer Networks CS321

Adaptive DCF of MAC for VoIP services using IEEE networks

Candidates should attempt FOUR questions. All questions carry 25 marks.

SSVVP SIP School VVoIP Professional Certification

Technical Support Information Belkin internal use only

Local-Area Network -LAN

IEEE Technical Tutorial. Introduction. IEEE Architecture

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

IT4405 Computer Networks (Compulsory)

Wireless LAN Concepts

Random Access Protocols

The Wireless Network Road Trip

Master Course Computer Networks IN2097

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

The ABCs of Spanning Tree Protocol

LAN / WAN Technologies

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Basic processes in IEEE networks

Administrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling

Transcription:

LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when needed key difference from repeaters LAN 1 LAN 2 Lecture #6: 9-13-01 2 Switched Network Advantages Higher link bandwidth Point to point electrically simpler than bus Much greater aggregate bandwidth Separate segments can send at once Improved fault tolerance Redundant paths Challenge Learning which packets to copy across links Avoiding forwarding loops Interconnecting LANs Q: Why not just one big LAN? Limited amount of supportable traffic: on single LAN, all stations must share bandwidth limited length: 802.3 specifies maximum cable length large collision domain (can collide with many stations) limited number of stations: 802.5 have token passing delays at each station Lecture #6: 9-13-01 3 Lecture #6: 9-13-01 4 Hubs Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces Hubs can be arranged in a hierarchy (or multi-tier design), with backbone hub at its top Hubs (more) Each connected LAN referred to as LAN segment Hubs do not isolate collision domains: node may collide with any node residing at any segment in LAN Hub Advantages: simple, inexpensive device Multi-tier provides graceful degradation: portions of the LAN continue to operate if one hub malfunctions extends maximum distance between node pairs (100m per Hub) Lecture #6: 9-13-01 5 Lecture #6: 9-13-01 6 1

Hub limitations single collision domain results in no increase in max throughput multi-tier throughput same as single segment throughput individual LAN restrictions pose limits on number of nodes in same collision domain and on total allowed geographical coverage cannot connect different Ethernet types (e.g., 10BaseT and 100baseT) Bridges Link Layer devices: operate on Ethernet frames, examining frame header and selectively forwarding frame based on its destination Bridge isolates collision domains since it buffers frames When frame is to be forwarded on segment, bridge uses CSMA/CD to access segment and transmit Lecture #6: 9-13-01 7 Lecture #6: 9-13-01 8 Bridges (more) Bridge advantages: Isolates collision domains resulting in higher total max throughput, and does not limit the number of nodes nor geographical coverage Can connect different types of Ethernet since it is a store-and-forward device Transparent: no need for any change to hosts LAN adapters Bridges: frame filtering, forwarding bridges filter packets same-lan -segment frames not forwarded onto other LAN segments forwarding: how to know which LAN segment on which to forward frame? looks like a routing problem (more shortly!) Lecture #6: 9-13-01 9 Lecture #6: 9-13-01 10 Backbone Bridge Interconnection Without Backbone Not recommended for two reasons: - single point of failure at Computer Science hub - all traffic between EE and SE must path over CS segment Lecture #6: 9-13-01 11 Lecture #6: 9-13-01 12 2

Bridge Filtering Bridge Filtering bridges learn which hosts can be reached through which interfaces: maintain filtering tables when frame received, bridge learns location of sender: incoming LAN segment records sender location in filtering table filtering table entry: (Node LAN Address, Bridge Interface, Time Stamp) stale entries in Filtering Table dropped (TTL can be 60 minutes) filtering procedure: if destination is on LAN on which frame was received then drop the frame else { lookup filtering table if entry found for destination then forward the frame on interface indicated; else flood; /* forward on all but the interface on which the frame arrived*/ } Lecture #6: 9-13-01 13 Lecture #6: 9-13-01 14 Bridge Learning: example Bridge Learning: example Suppose C sends frame to D and D replies back with frame to C C sends frame, bridge has no info about D, so floods to both LANs bridge notes that C is on port 1 frame ignored on upper LAN frame received by D Lecture #6: 9-13-01 15 D generates reply to C, sends bridge sees frame from D bridge notes that D is on interface 2 bridge knows C on interface 1, so selectively forwards frame out via interface 1 Lecture #6: 9-13-01 16 Bridges Spanning Tree WWF Bridges vs. Routers for increased reliability, desirable to have redundant, alternate paths from source to dest with multiple simultaneous paths, cycles result - bridges may multiply and forward frame forever solution: organize bridges in a spanning tree by disabling subset of interfaces Disabled both store-and-forward devices routers: network layer devices (examine network layer headers) bridges are Link Layer devices routers maintain routing tables, implement routing algorithms bridges maintain filtering tables, implement filtering, learningand spanning tree algorithms Lecture #6: 9-13-01 17 Lecture #6: 9-13-01 18 3

Routers vs. Bridges Bridges + and - + Bridge operation is simpler requiring less processing bandwidth - Topologies are restricted with bridges: a spanning tree must be built to avoid cycles - Bridges do not offer protection from broadcast storms (endless broadcasting by a host will be forwarded by a bridge) Routers vs. Bridges Routers + and - + arbitrary topologies can be supported, cycling is limited by TTL counters (and good routing protocols) + provide firewall protection against broadcast storms - require IP address configuration (not plug and play) - require higher processing bandwidth bridges do well in small (few hundred hosts) while routers used in large networks (thousands of hosts) Lecture #6: 9-13-01 19 Lecture #6: 9-13-01 20 Ethernet Switches Ethernet Switches layer 2 (frame) forwarding, filtering using LAN addresses Switching: A-to-B and A -to-b simultaneously, no collisions large number of interfaces often: individual hosts, starconnected into switch Ethernet, but no collisions! cut-through switching: frame forwarded from input to output port without awaiting for assembly of entire frame slight reduction in latency combinations of shared/dedicated, 10/100/1000 Mbps interfaces Lecture #6: 9-13-01 21 Lecture #6: 9-13-01 22 Ethernet Switches (more) IEEE 802.11 Wireless LAN Shared Dedicated wireless LANs: untethered (often mobile) networking IEEE 802.11 standard: MAC protocol unlicensed frequency spectrum: 900Mhz, 2.4Ghz Basic Service Set (BSS) (a.k.a. cell ) contains: wireless hosts access point (AP): base station BSS s combined to form distribution system (DS) Lecture #6: 9-13-01 23 Lecture #6: 9-13-01 24 4

Ad Hoc Networks IEEE 802.11 MAC Protocol: CSMA/CA Ad hoc network: IEEE 802.11 stations can dynamically form network without AP Applications: laptop meeting in conference room, car interconnection of personal devices battlefield IETF MANET (Mobile Ad hoc Networks) working group Lecture #6: 9-13-01 25 802.11 CSMA: sender - if sense channel idle for DISF sec. then transmit entire frame (no collision detection) -if sense channel busy then binary backoff 802.11 CSMA receiver: if received OK return ACK after SIFS Lecture #6: 9-13-01 26 IEEE 802.11 MAC Protocol 802.11 CSMA Protocol: others NAV: Network Allocation Vector 802.11 frame has transmission time field others (hearing sata) defer access for NAV time units Hidden Terminal effect hidden terminals: A, C cannot hear each other obstacles, signal attenuation collisions at B goal: avoid collisions at B CSMA/CA: CSMA with Collision Avoidance Lecture #6: 9-13-01 27 Lecture #6: 9-13-01 28 Collision Avoidance: RTS-CTS exchange CSMA/CA: explicit channel reservation sender: send short RTS: request to send receiver: reply with short CTS: clear to send CTS reserves channel for sender, notifying (possibly hidden) stations avoid hidden station collisions Lecture #6: 9-13-01 29 Collision Avoidance: RTS-CTS exchange RTS and CTS short: collisions less likely, of shorter duration end result similar to collision detection IEEE 802.11 allows: CSMA CSMA/CA: reservations polling from AP Lecture #6: 9-13-01 30 5

Point-to-Point Data Link Control one sender, one receiver, one link: easier than broadcast link: no Media Access Control no need for explicit MAC addressing e.g., dialup link, ISDN line popular point-to-point DLC protocols: PPP (point-to-point protocol) HDLC: High level data link control (Data link used to be considered high layer in protocol stack!) PPP Design Requirements [RFC 1557] packet framing: encapsulation of network-layer datagram in data link frame carry network layer data of any network layer protocol (not just IP) at same time ability to demultiplex upwards bit transparency: must carry any bit pattern in the data field error detection (no correction) connection liveness: detect, signal link failure to network layer network layer address negotiation: endpoint can learn/configure each other s network address Lecture #6: 9-13-01 31 Lecture #6: 9-13-01 32 PPP non-requirements no error correction/recovery no flow control out of order delivery OK no need to support multipoint links (e.g., polling) PPP Data Frame Flag: delimiter (framing) Address: does nothing (only one option) Control: does nothing; in the future possible multiple control fields Protocol: upper layer protocol to which frame delivered (e.g., PPP-LCP, IP, IPCP, etc) Error recovery, flow control, data re-ordering all relegated to higher layers! Lecture #6: 9-13-01 33 Lecture #6: 9-13-01 34 PPP Data Frame info: upper layer data being carried check: cyclic redundancy check for error detection Byte Stuffing data transparency requirement: data field must be allowed to include flag pattern <01111110> Q: is received <01111110> data or flag? Sender: adds ( stuffs ) extra < 01111110> byte after each < 01111110> data byte Receiver: two 01111110 bytes in a row: discard first byte, continue data reception single 01111110: flag byte Lecture #6: 9-13-01 35 Lecture #6: 9-13-01 36 6

Byte Stuffing PPP Data Control Protocol flag byte pattern in data to send flag byte pattern plus stuffed byte in transmitted data Before exchanging networklayer data, data link peers must configure PPP link (max. frame length, authentication) learn/configure network layer information for IP: carry IP Control Protocol (IPCP) msgs (protocol field: 8021) to configure/learn IP address Lecture #6: 9-13-01 37 Lecture #6: 9-13-01 38 7