Token Passing: IEEE802.5 standard. IEEE802.5 standard

Similar documents
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Based on Computer Networking, 4 th Edition by Kurose and Ross

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Ethernet, VLAN, Ethernet Carrier Grade

UPPER LAYER SWITCHING

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

RTT 60.5 msec receiver window size: 32 KB

Controlled Random Access Methods

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Final for ECE374 05/06/13 Solution!!

The IP Transmission Process. V1.4: Geoff Bennett

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Ethernet. Ethernet. Network Devices

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Internet Packets. Forwarding Datagrams

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Network Security TCP/IP Refresher

Data Communication and Computer Network

Lecture 7 Multiple Access Protocols and Wireless

Module 15: Network Structures

Chapter 14: Distributed Operating Systems

Level 2 Routing: LAN Bridges and Switches

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Subnetting,Supernetting, VLSM & CIDR

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Ring Local Area Network. Ring LANs

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Chapter 16: Distributed Operating Systems

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Technical Support Information Belkin internal use only

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Chapter 7 Low-Speed Wireless Local Area Networks

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Network Layer: Network Layer and IP Protocol

The Network Layer Functions: Congestion Control

EPL 657 Wireless Networks

Internetworking and IP Address

LAN Switching and VLANs

Communication Systems Internetworking (Bridges & Co)

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

First Midterm for ECE374 03/09/12 Solution!!

Mathatma Gandhi University

Random Access Protocols

Lecture Computer Networks

Internet Control Protocols Reading: Chapter 3

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Network Layers. CSC358 - Introduction to Computer Networks

CSE 123A Computer Networks

11/22/

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Internetworking and Internet-1. Global Addresses

Internet structure: network of networks

Computer Networks I Laboratory Exercise 1

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Chapter 9. IP Secure

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

RARP: Reverse Address Resolution Protocol

Computer Networks and the Internet

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

Overview of Routing between Virtual LANs

Introduction to LAN/WAN. Network Layer (part II)

Internet Protocols Fall Lectures 7-8 Andreas Terzis

Computer Networks CS321

Leased Line PPP Connections Between IOS and HP Routers

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

How To Communicate With A Token Ring Network (Dihon)

From Fieldbus to toreal Time Ethernet

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

WAN Data Link Protocols

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

iseries TCP/IP routing and workload balancing

Network Models and Protocols

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Computer Networks Vs. Distributed Systems

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Transcription:

Token Passing: IEEE802.5 standard. 4 Mbps. maximum token holding time: 10 ms, limiting packet length. packet (token, data) format:. SD, ED mark start, end of packet 1 IEEE802.5 standard. AC access control byte: token bit: value 0 means token can be seized, value 1 means data follows FC priority bits: priority of packet reservation bits: station can write these bits to prevent stations with lower priority packet from seizing token after token becomes free. FC frame control: used for monitoring and maintenance 2 1

IEEE802.5 standard. source, destination address: 48 bit physical address, as in Ethernet. data: packet from network layer. checksum. frame status (FS): set by destination, read by sender set to indicate destination is up, pkt copied OK from ring DLC-level ACKing 3 Time Division Multiple Access. TDMA: time division multiple access. access to channel in "rounds". each station gets fixed length slot (pkt( trans time) in each round. unused slots go idle. example: 6-station LAN, 1,3,4 have pkt,, 2,5,6 idle Pros and cons: 4 2

Reservation-based Protocols. want to avoid wasted slots in TDMA. access to channel in rounds (again). Each round:. begins with N short reservation slots reservation slot time equal to end-end propagation delay of channel station with message to send posts reservation (1) in its reservation slot reservation slots seen by all stations. after reservation slots, message transmissions ordered by known priority 5 Pros and cons: 6 3

Critical Assessment of Multiple Access Protocols Random access: Alohas Alohas,, CSMA, group Controlled, predetermined: TDMA Controlled demand adaptive: tokens, reservation 7 ARP: Address Resolution Protocol. IEEE802.* (Ethernet, token ring/bus) interface cards only recognize 48-bit IEEE 802. physical layer addresses on packets. network layer uses IP address (32 bits) Q: how to determine physical address of machine with given IP address? 8 4

ARP : Address Resolution Protocol. A knows B's IP address, wants to learn physical address of B. A broadcasts ARP query pkt,, containing B's IP address. all machines on LAN receive ARP query. B receives ARP packet, replies to A with its (B's) physical layer address. A caches (saves) IP-to-physical address pairs until information becomes old (times out) soft state: information that times out (goes away) 9 10 5

Routing and Physical Layer Addresses: synthesis. P Host A knows router R is next hop to IP destination B:. A creates IP packet with source A, destination B. A uses ARP to get physical layer address of R. A creates Ethernet packet with R's physical address as dest,, Ethernet packet contains A-to-B IP packet. A sends Ethernet packet. R receives Ethernet packet. R removes IP datagram from Ethernet packet, sees it is destined to B. R creates physical layer packet, containing A-to-B IP datagram and sends to next router on route to B 11 Interconnecting LANs Why not just one big LAN?. limited amount of supportable traffic: on single LAN, all stations must share bandwidth. limited length: 802.3 specifies maximum cable length. limited number of stations: 802.4/5 have token passing delays at each station 12 6

Bridges and Repeaters Bridges versus Repeaters for interconnecting LANs Repeater. copies (amplifies, regenerates) bits between LAN segments. no storage of packets. physical-level (only) interconnection of LANs Bridge. receives, stores, forward (when appropriate) packets between LANs. has two layers of protocol stack: physical and link- level (media access) 13 Bridges versus routers Bridges are arguably routers. know physical layer addresses of stations on each interconnected LAN. receive and selectively forwards packets transmitted on LAN 14 7

Bridges versus routers Bridges are not routers. no knowledge of "outside world", only stations on interconnected LAN. bridges don't exchange routing tables. deal only with physical layer addresses 15 Bridges: Forward Packets Bridges filter packets. intra-lan -segment pkts not forwarded onto other LAN segments. inter-lan-segment pkts must be forwarded, but where? 16 8

Bridges: Forward Packets Techniques for forwarding packets. flood packets (obvious drawbacks). router-discovery-like protocol allows bridge to identify hosts on LAN segment drawbacks?. bridge "observes" traffic and "learns" which stations are attached transparent: just add bridge to LAN, all hosts behave as if bridge were not there 17 Bridges: the headaches of 3 LAN standards Computation. bridge may need to translate between 3 802 standards (each 802.* has different format). translated packet requires new checksum Speed mismatch. different 802.* LAN's operate at different speeds. what if lots of Ethernet traffic destined to token ring? 18 9

Bridges: the headaches of 3 LAN standards Size mismatches. has 1518 byte max packet size, 802.4 has 8191 byte max packet size. what if 802.4 pkt forwarded onto 802.3 Ethernet? fragmentation at physical layer? drop packet (the IEEE standard) Other mismatches. 802.5 has priorities; 802.3 does not.... 19 Switched 802.3 LAN's. bridges interconnect general 802.* LANs may require packet conversion Switched Ethernet:. central "hub" interconnects ethernet segments. in practice, each segment often has only one computer. simultaneous transmission to same destination let first one through possibly buffer other packets 20 10

Switched 802.3 LAN's 21 DLC Summary. point-to-point DLC: "standard" reliable data transfer techniques. the multiple access problem random access protocols (collisions) demand adaptive, controlled (collision) free protocols: token passing, mini-slotted reservations TDMA. IEEE 802.* standards: Ethernet, token bus and ring. bridges, switches for interconnecting LANs 22 11