Ethernet, VLAN, Ethernet Carrier Grade



Similar documents
Random Access Protocols

Based on Computer Networking, 4 th Edition by Kurose and Ross

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Lecture 7 Multiple Access Protocols and Wireless

CSE 123A Computer Networks

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Virtual LANs. or Raj Jain

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Resiliency in Ethernet Based Transport Networks

CS263: Wireless Communications and Sensor Networks

Controlled Random Access Methods

VLAN and QinQ Technology White Paper

Master Course Computer Networks IN2097

Ring Local Area Network. Ring LANs

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

EPL 657 Wireless Networks

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

RTT 60.5 msec receiver window size: 32 KB

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

UPPER LAYER SWITCHING

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

How To Make A Network Cable Reliable And Secure

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

11/22/

Data Link Layer. Page 1. Ethernet

How To Make A Multi-User Communication Efficient

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

VLANs. Application Note

An Introduction to Open vswitch

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Gigabit Ethernet: Architectural Design and Issues

Understanding PBB-TE for Carrier Ethernet

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

enetworks TM IP Quality of Service B.1 Overview of IP Prioritization

- Hubs vs. Switches vs. Routers -

CS 348: Computer Networks. - IP addressing; 21 st Aug Instructor: Sridhar Iyer IIT Bombay

Backbone Provider Bridging Networks A Highly Scalable VLAN (Multicast) Architecture

Overview of Routing between Virtual LANs

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

Module 15: Network Structures

Provider Backbone Bridging Traffic Engineering of Carrier Ethernet Services

VXLAN: Scaling Data Center Capacity. White Paper

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

From Fieldbus to toreal Time Ethernet

Computer Networks CS321

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Overview of Computer Networks

Implementation of Virtual Local Area Network using network simulator

How To Configure Voice Vlan On An Ip Phone

CMA5000 SPECIFICATIONS Gigabit Ethernet Module

SSVVP SIP School VVoIP Professional Certification

Advanced features on Ethernet networks. Fulvio Risso Politecnico di Torino

Communications and Computer Networks

What is VLAN Routing?

Shortest Path Bridging IEEE 802.1aq Overview

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Communication Systems Internetworking (Bridges & Co)

Chapter 14: Distributed Operating Systems

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF

Networking 4 Voice and Video over IP (VVoIP)

Real-Time (Paradigms) (51)

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Level 2 Routing: LAN Bridges and Switches

Chapter 16: Distributed Operating Systems

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

ECE/CS 372 introduction to computer networks. Lecture 13

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

SSVP SIP School VoIP Professional Certification

LAN Switching and VLANs

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

The IP Transmission Process. V1.4: Geoff Bennett

network infrastructure: getting started with VoIP

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Introduction to IP v6

Cloud Infrastructure Planning. Chapter Six

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

TRILL for Data Center Networks

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

How To Communicate With A Token Ring Network (Dihon)

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Riverstone Networks. Carrier Ethernet Standards Progress. Igor Giangrossi Sr. Systems Engineer, CALA

Transcription:

Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1

Point-to-Point vs. Broadcast Media Point-to-point PPP for dial-up access Point-to-point link between Ethernet switch and host Broadcast (shared wire or medium) Traditional Ethernet 802.11 wireless LAN RTEL 2

Three Ways to Share the Media Channel partitioning MAC protocols: Divide channel into pieces: share channel efficiently and fairly at high load Inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node! Taking turns protocols: Passing a token for the right to transmit Eliminates empty slots without causing collisions Vulnerable to failures (e.g., failed node or lost token) Random access MAC protocols: allow collisions, and then recover Efficient at low load: single node can fully utilize channel High load: collision overhead RTEL 3

Channel Partitioning: TDMA TDMA: time division multiple access Access to channel in "rounds" Each station gets fixed length slot in each round Time-slot length is packet transmission time Unused slots go idle Example: 6-station LAN with slots 1, 3, and 4 RTEL 4

Channel Partitioning: FDMA FDMA: frequency division multiple access Channel spectrum divided into frequency bands Each station assigned fixed frequency band Unused transmission time in bands go idle Example: 6-station LAN with bands 1, 3, and 4 time frequency bands RTEL 5

Taking Turns MAC protocols Polling Master node invites slave nodes to transmit in turn Concerns: Polling overhead Latency Single point of failure (master) Token passing Control token passed from one node to next sequentially Token message Concerns: Token overhead Latency Single point of failure (token) RTEL 6

Random Access Protocols When node has packet to send Transmit at full channel data rate R. No a priori coordination among nodes Two or more transmitting nodes => collision, Random access MAC protocol specifies: How to detect collisions How to recover from collisions Examples ALOHA and Slotted ALOHA CSMA, CSMA/CD, CSMA/CA RTEL 7

Key Ideas of Random Access Carrier Sense (CS) Listen before speaking, and don t interrupt Checking if someone else is already sending data and waiting till the other node is done Collision Detection (CD) If someone else starts talking at the same time, stop Realizing when two nodes are transmitting at once by detecting that the data on the wire is garbled Randomness Don t start talking again right away Waiting for a random time before trying again RTEL 8

Slotted ALOHA Assumptions All frames same size Time divided into equal slots (time to transmit a frame) Nodes start to transmit frames only at start of slots Nodes are synchronized If two or more nodes transmit, all nodes detect collision Operation When node obtains fresh frame, transmits in next slot No collision: node can send new frame in next slot Collision: node retransmits frame in each subsequent slot with probability p until success RTEL 9

Slotted ALOHA Pros Single active node can continuously transmit at full rate of channel Highly decentralized: only slots in nodes need to be in sync Simple Cons Collisions, wasting slots Idle slots Nodes may be able to detect collision in less than time to transmit packet Clock synchronization RTEL 10

CSMA (Carrier Sense Multiple Access) Collisions hurt the efficiency of ALOHA protocol At best, channel is useful 37% of the time CSMA: listen before transmit If channel sensed idle: transmit entire frame If channel sensed busy, defer transmission Human analogy: don t interrupt others! RTEL 11

CSMA Collisions Collisions can still occur: propagation delay means two nodes may not hear each other s transmission Collision: entire packet transmission time wasted RTEL 12

CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA Collisions detected within short time Colliding transmissions aborted, reducing wastage Collision detection Easy in wired LANs: measure signal strengths, compare transmitted, received signals Difficult in wireless LANs: receiver shut off while transmitting Human analogy: the polite conversationalist RTEL 13

CSMA/CD Collision Detection RTEL 14

Ethernet Dominant wired LAN technology: First widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed race: 10 Mbps 10 Gbps Metcalfe s Ethernet sketch RTEL 15

Ethernet Uses CSMA/CD Carrier Sense: wait for link to be idle Channel idle: start transmitting Channel busy: wait until idle Collision Detection: listen while transmitting No collision: transmission is complete Collision: abort transmission, and send jam signal Random access: exponential back-off After collision, wait a random time before trying again After m th collision, choose K randomly from {0,, 2 n -1} ; n = min (m, 10) Wait for K*512 bit times before trying again (for Ethernet 10Mb/s, 512 bit times = 51.2 µs) The more collisions occured, the more the station may have to wait before attempting retransmission After 16 attempts, the station gives up its transmission RTEL 16

Shared Ethernet and max distance In 10Mbps Ethernet networks, the minimal Ethernet frame length is 64 bytes Why such a limitation? According to the CSMA/CD method, a station must listen to the medium while transmitting in order to detect collisions The frame has to be long enough With a fixed minimal frame length, the maximum distance between 2 stations on a shared network can be calculated. RTEL 17

Maximum Length in Ethernet A! B! latency d! If A emits a minimal frame, the emission lasts 51,2 µs In the worst case scenario B starts emitting just before receiving the first bit emitted by A A will know that a collision occured after a complete round trip between A and B 2 * t prop, with t prop = D AB / Speed Prop After a round trip time, A must still be emitting t trans 2*t prop With Speed Prop = 200 000 km/s, D AB 5,12 km Imposes restrictions on Ethernet length M/D >= 2*L/V M: Minimum frame size : 64 bytes = 512 bits D: Transmission data rate L: Length of the network V: Signal propagation speed along the cable RTEL 18

Ethernet frame Bytes 6 6 2 46-1500 4 DA SA L/ T DATA FCS Bits 24 24 OUI Device Id OUI: Organization Unique Id RTEL 19

Connecting L2&L3 : ARP The Address Resolution Protocol (ARP) -- the mechanisms for translating IP addresses to physical addresses and hide these physical addresses from the upper layers. How it works A requester takes an IP address and searches for a corresponding physical address in a mapping table. Address found, it returns the 48 bit address, such as a workstation or server on a LAN. Address not found, à ARP module sends a broadcast -- ARP request containing the IP address-- onto the network. The machine recognizing its IP returns an ARP reply to the inquiring host. The inquiring host places this address into the ARP cache. RTEL 20

Hubs: Physical-Layer Repeaters Hubs are physical-layer repeaters Bits coming from one link go out all other links At the same rate, with no frame buffering No CSMA/CD at hub: adapters detect collisions twisted pair hub RTEL 21

Interconnecting with Hubs Backbone hub interconnects LAN segments All packets seen everywhere, forming one large collision domain Can t interconnect Ethernets of different speeds hub hub hub hub RTEL 22

Bridge Link layer device Examines frame header and selectively forwards frame based on MAC dest address When frame is to be forwarded on segment, uses CSMA/CD to access segment Transparent Hosts are unaware of presence of bridges RTEL 23

Bridge: Traffic isolation Bridge breaks subnet into LAN segments Bridge filters packets Same-LAN-segment frames not usually forwarded onto other LAN segments Segments become separate collision domains Bridge collision domain hub hub hub collision domain collision domain RTEL 24

From a shared solution to a switched solution switch Ethernet switching: LAN segments contain only one station each, interconnecting with a switch Switches are Plug-and-play, self-learning (do not need to be configured) Speed: 10, 100 Mbps, 1, 10 and 100 Gbps No collision, no limitation of distance RTEL 25

Switched Ethernet Bridges and Ethernet switch are intelligent equipments Packet switching based on MAC destination address Allows VLAN management Each side of a bridge, or each port of a switch is an independent Ethernet network No distance limitation in switched networks Higher throughput (until 40 Gbps) Main difficulty : Each switch has to know the MAC address of every station on the whole network Frames may pile up in switches : flow control is necessary Pause frame RTEL 26

Ethernet switching 2 generations The old one: we use the Ethernet address as a label. The signaling technique is implicit. When an Ethernet switch receive a packet, it verifies that the switching table possesses a line with this label and the output interface. If there is no output line defining how to go to the destination MAC @, the switch sends a multicast packet (ARP packet) to find where is the destination node and update its switching table. A B 1 2 3 4 RTEL 27

Ethernet switching The new generation: A pure switching technique with a field transporting the label. The MPLS label is used as the reference for switching: this is the MPLS Ethernet forwarding. IP signaling What happens in case of link failure? With MAC address switching : sending of a multicast packet to find the station or a switch that knows where to forward the packet With MPLS Ethernet forwarding : Back up paths can be used RTEL 28

Virtual Local Area Network Network traffic consists of a high percentage of broadcasts and multicasts Reduce the need to send such traffic to unnecessary destinations Use VLAN VLAN is a broadcast domain Group of hosts (ports) on the switch with a common set of requirements Group of hosts communicate as if they were attached to the same wire VLAN has the same attributes as a physical LAN VLAN allows grouping to the end stations, services and devices, which do not need to locate on the same LAN segment Traffic can be switched between VLANs with a router RTEL 29

VLAN Operations VLAN has a switched network that is logically segmented Each switch port can be assigned to a VLAN Ports assigned to the same VLAN share broadcasts. Ports that do not belong to that VLAN do not share these broadcasts This improves network performance because unnecessary broadcasts are reduced RTEL 30

Difference of VLAN and LAN RTEL 31

How does it works? Switch receives data from a workstation, it tags the data with a VLAN identifier Tagging can be based on : The port from which it came (Layer 1 VLAN) The source Media Access Control (MAC) field (Layer 2 VLAN) The source network address (Layer 3 VLAN) Or some other field or combination of fields RTEL 32

Virtual networks (physical ports) VLAN 1: #1,3 STATION A STATION B STATION C VLAN 2: # 2,4,5 5 1 2 3 Switch A 4 STATION D STATION F RTEL 33

Virtual networks (MAC addresses) STATION A STATION B STATION C VLAN 1 Switch A STATION D Switch B STATION F3 VLAN 2 STATION F1 STATION F2 RTEL 34

VLAN Tagging First switch adds tag containing VLAN id to all incoming packets Intermediate switches do not recompute the VLAN id Last switch removes tags from all outgoing packets Tag is not swapped at every hop like VC Id or labels RTEL 35

Ethernet Frame for VLAN (IEEE 802.1Q) Octets CRC Octets Tag Protocol ID (TPID) : 0x8100 to identify the frame as a VLAN tagged frame. This value indicates to a L2 device that the frame has an 802.1Q tag. 3 priority bits 8 levels of priority from 0 (lowest) to 7 (highest) The priority bits are the reason why 802.1Q is often referred to as 802.1p/Q. CFI (Canonical Format Indicator): Bit order of address info in Token Ring / FDDI frames. Always set to zero for Ethernet switches. VLAN ID identify the VLAN (12 bits => 4094 different VLANs): A value of 0 means that the frame does not belong to any VLAN; in this case the 802.1Q tag specifies only a priority and is referred to as a priority tag. bits RTEL 36

Ethernet Carrier Grade Characteristics of Carrier Grade: Scalability: billons of users Availability Five«9» = 99,999 pourcentage of availability Time before re-establising a session SONET/SDH : 50 ms n:m:l technology (n paths backuped by m path, backuped by l paths) «Hard» QoS: Strong guaranty on some services How to add these guaranties to get a carrier grade Ethernet? RTEL 37

Reference Provider Transport Architecture PE Provider Network PE RB CE CE CE Customer Network CE RB Customer Network Regular bridges PE: Provider Edge CE: Customer Edge

Ethernet Carrier Grade Three solutions: MPLS Ethernet forwarding MEF (Metro Ethernet Forum) Ethernet GVLAN (Generalized VLAN) A VLAN may correspond to a path establishment if point to point VLAN may allow QoS with traffic monitoring, but the number of possible VLAN is too small (4094) for scalability RTEL 39

1 st solution : MPLS Ethernet forwarding IP signaling to open a path (LSP) Label all along the path (MPLS Label or Shim Label) Ethernet switching along the path RTEL 40

2nd solution : Metro Ethernet Forum (MEF) MEF (founded in 2001), international industry consortium, dedicated to worldwide adoption of Carrier Ethernet networks and services. Composed of leading service providers, network equipment vendors, and other networking compagnies. It had 160 members as of Feb. 2010. MEF : Metro Ethernet Forum RTEL 41

3rd solution: Ethernet Carrier Grade Q-tag (defined in IEEE 802.1Q) allowing to define VLAN Management and performance are improved Three solutions for this approach: IEEE 802.1ad : known as Q-in-Q, stacked VLANs or Provider Bridging, that extend the first definition of VLAN. Creation of a VLAN field for the service provider Service provider can only use 4094 VLANs, still insufficient IEEE 802.1ah : known as MAC-in-MAC, or Provider Backbone Bridge Client MAC is encapsulated in the service provider MAC address The operator only needs to know its own MAC to switch the frame Provider Backbone Transport (PBT) : Creation of a MPLS tunnel MPLS references corresponds to the network ends MPLS allows much larger VLAN differentiation: add a 48 bit reference => total 24 + 48 = 72 bits VLAN identifier. RTEL 42

Q-in-Q (802.1ad) DA SA DA SA DA SA Payload 802.1 VID Payload S-VID C-VID 802.1q SA: Source Address DA: Destination address VID: VLAN ID (802.1q Tag) S-VID: Service VID (802.1q Outer Tag or Metro Tag) C-VID: Customer VID (802.1q Inner Tag) Payload 802.1ad RTEL 43

3rd solution: Ethernet Carrier Grade Q-tag (defined in IEEE 802.1Q) allowing to define VLAN Management and performance are improved Three solutions for this approach: IEEE 802.1ad : known as Q-in-Q, stacked VLANs or Provider Bridging, that extend the first definition of VLAN. Creation of a VLAN field for the service provider Service provider can only use 4094 VLANs, still insufficient IEEE 802.1ah : known as MAC-in-MAC, or Provider Backbone Bridge Client MAC is encapsulated in the service provider MAC address The operator only needs to know its own MAC to switch the frame Provider Backbone Transport (PBT) : Creation of a MPLS tunnel MPLS references corresponds to the network ends MPLS allows much larger VLAN differentiation: add a 48 bit reference => total 24 + 48 = 72 bits VLAN identifier. RTEL 44

MAC-in-MAC (802.1ah) DA SA Payload 802.1 SA: Source Address DA: Destination address VID: VLAN ID S-VID: Service VID C-VID: Customer VID B-SA: Backbone SA B-DA: Backbone DA B-VID: Backbone VID I-SID: Service Instance ID DA SA VID Payload 802.1q DA SA S-VID C-VID Payload 802.1ad B-DA B-SA B-VID I-SID DA SA S-VID C-VID Payload 802.1ah RTEL 45

3rd solution: Ethernet Carrier Grade Q-tag (defined in IEEE 802.1Q) allowing to define VLAN Management and performance are improved Three solutions for this approach: IEEE 802.1ad : known as Q-in-Q, stacked VLANs or Provider Bridging, that extend the first definition of VLAN. Creation of a VLAN field for the service provider Service provider can only use 4094 VLANs, still insufficient IEEE 802.1ah : known as MAC-in-MAC, or Provider Backbone Bridge Client MAC is encapsulated in the service provider MAC address The operator only needs to know its own MAC to switch the frame Provider Backbone Transport (PBT) : Creation of a MPLS tunnel MPLS references corresponds to the network ends MPLS allows much larger VLAN differentiation: add a 48 bit reference => total 24 + 48 = 72 bits VLAN identifier. RTEL 46

PBT DA SA Payload 802.1 SA: Source Address DA: Destination address VID: VLAN ID S-VID: Service VID C-VID: Customer VID B-SA: Backbone SA B-DA: Backbone DA B-VID: Backbone VID MPLS-SL: Service Label DA SA VID Payload 802.1q DA SA S-VID C-VID Payload 802.1ad B-DA B-SA B-VID MPLS-SL DA SA S-VID C-VID Payload PBT RTEL 47