Performance Metrics Outline Bandwidth Latency Bandwidth-delay product.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 5 – Collision management.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 4 – Ethernet frame.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Spring 2003CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Distributed Systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 3 – Introduction to Ethernet.
1 Announcements Prelim and submission for 3 rd CS 415 project Homework 4 graded.
Data Link Layer IS250 Spring 2010
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff.
Ethernet.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
14-Oct-15Computer Networks1 Reliable Transmission.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
1Ethernet Lecture # 12 Computer Communication & Networks.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
9-Jan-164/598N: Computer Networks Overview Performance metrics - Section 1.5 Direct link networks –Hardware building blocks - Section 2.1 –Encoding - Section.
Physical Layer Issues and Methods Outline Physical Layer Overview Non-Return to Zero Manchester 4B/5B.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet “dominant” LAN technology: cheap $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed.
Physical Layer Issues and Methods Outline Physical Layer Ethernet Technology Physical Layer Encoding Final Exam Review - ??
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 Ethernet History –developed by Xerox PARC in mid-1970s –roots in Aloha packet-radio network –standardized by Xerox, DEC, and Intel in 1978 –similar to.
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
1 Point-to-Point Links: Encoding Encoding: Section 2.2 (Section 2.1 read on your own)
Lec # 23 Data communucation Muhammad Waseem Iqbal 1ethernet.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
CS 457 – Lecture 3 Link Layer Protocols Fall 2011.
CS380 Int. to Comp. Networks Data Link Networks - Part II1 Reliable Transmission How to fix corrupted frames. –Error correcting codes too expensive –Should.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Advanced Computer Networks
Networks Lecture 7.
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
CS 457 – Lecture 6 Ethernet Spring 2012.
Reliable transmission
Ethernet Neil Tang 9/17/2008 CS440 Computer Networks.
Protocol layering and data
Protocol layering and data
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
Presentation transcript:

Performance Metrics Outline Bandwidth Latency Bandwidth-delay product

CS 6402 Performance Metrics Bandwidth (throughput) –data transmitted per time unit –link versus end-to-end –notation KB = 1000 bytes Mbps = 10 6 bits per second Latency (delay) –time to send message from point A to point B –one-way versus round-trip time (RTT) RTT: time for a packet to go from A to B and B to respond back to A (e.g., with an ACK or Acknowledgment) –components Latency = Propagation + Transmit + Queue Propagation = Distance / c Transmit = Size / Bandwidth

CS 6403 Bandwidth versus Latency Relative importance –1-byte: 1ms vs 100ms dominates 1Mbps vs 100Mbps –25MB: 1Mbps vs 100Mbps dominates 1ms vs 100ms Infinite bandwidth –RTT dominates Throughput = TransferSize / TransferTime TransferTime = RTT + (1/Bandwidth) x TransferSize

CS 6404 Delay x Bandwidth Product Amount of data “in flight” or “in the pipe” Example: 100ms x 45Mbps = 560KB

Physical Layer Issues and Methods Outline Physical Layer Overview Encoding Framing Error Detection

Intro Problem statement: getting packets across the physical network For now, we will focus on one segment of a network — i.e., there are no switches Key issues that arise here: –links operate on signal — electromagnetic. We are dealing with digital info — encoding –we are sending packets over the links — need other end to know when “packet” was received — framing –there may be errors in transmission or reception — what to do? error detection –there may be multiple senders contending — on a shared medium. How to get people to –take turns and share fairly — multiple access CS 6406

7 Physical Layer Data Transfer Signals are placed on wire via transceivers Problem is how to do transmit 0’s and 1’s (signal encoding) in a robust fashion –Binary voltage encoding Map 1 to high voltage Map 0 to low voltage –How are consecutive 0’s or 1’s detected at node? Clock synchronization problem Transmitted signals have a variety of problems –Attenuation –Noise –Dispersion

CS 6408 Non-Return to Zero (NRZ) High voltage = 1 and low voltage = 0 Voltage does not return to 0 between bits Receiver keeps average of signal seen to distinguish 0 from 1

CS 6409 NRZ Benefits –Easy to engineer – most basic encoding –Efficient use of bandwidth – not many transitions Drawbacks –Long strings of 0’s can be confused with no signal –Long strings of 1’s can cause signal average to wander –Clock synchronization can be poor

CS NRZ-Inverted (NRZI) NRZI addresses clock synchronization problem –Encodes 1 by transitioning from current signal –Encodes 0 by staying at current signal So we’re still out of luck on consecutive strings of 0’s

CS Manchester Data Encoding Explicit merging of clock and bit stream –Each bit contains a transition High-low = 1 Low-high = 0 –Enables effective clock signal recovery at receiver Clocks are still needed to differentiate between bit boundaries Poor bandwidth utilization –Effective sending rate is cut in half Used by – 10Mbps Ethernet

CS Manchester Encoding contd. +V -V Encoding for 1 +V -V Encoding for 0 0 +V -V Bit BoundariesSignal Edges

CS B/5B Encoding Tries to address inefficiencies in Manchester Every 4 bits of data are encoded in a 5 bit code –Encodings selections At most one leading 0 At most two trailing 0’s Never more than three consecutive 0’s Uses NRZI to put bits on the wire This is why code is focused on zeros 80% efficiency See text for details of codes

Framing Need the other end of the link to know when a packet transmission started and ended. –What makes this challenging? Packets can be of different length and knowing start is hard — are you just hearing noise? Approach: add delimiters –Byte oriented — add special bytes at the beginning and end. If the special byte appears in payload then you would need to escape it. Another approach — have a starting special byte, and then include a byte counter. –Bit oriented — add special bit sequences at beginning and end. You would need to escape individual bits in case they appear in the payload. Enough to understand this idea at this high level. CS 64014

Error Detection Classic problem — a lot of this is math, so we will gloss over. In networks there are many choices: –don’t detect errors. Let higher layer deal with it end to end. –detect errors and retroactively correct it. –proactively correct errors. Generally latter two are used in many network technologies –End to end sanity checks almost always used. –For cost and efficiency reasons. Error detection is common. Some possible approaches: –Add parity bits. –Add parity bytes. –Compute some function over payload and add that to end of message — receiver checks. Common ideas here: check sum — IP layer uses this. Simple to implement but not robust. cyclic redundancy check — Ethernet uses this. A little more complex, but more robust to more different error patterns. CS 64015

Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff

CS Shared Access Networks Shared Access Networks assume multiple nodes on the same physical link –Bus, ring and wireless structures –Transmission sent by one node is received by all others –No intermediate switches Need methods for moderating access –Medium Access Control Protocols, or MAC protocols –Fairness –Performance –How can this be done?

CS Multiple Access Methods Fixed assignment –Partition channel so each node gets a slice of the bandwidth –Essentially circuit switching – thus inefficient –Examples: TDMA, FDMA, CDMA (all used in wireless/cellular environments) Contention-based –Nodes contends equally for bandwidth and recover from or avoid collisions –Examples: Aloha, Ethernet, Wireless Token-based or reservation-based –Take turns using the channel –Examples: Token ring

Ethernet History –Developed by Bob Metcalfe and others at Xerox PARC in mid-1970s –Standardized by Xerox, DEC, and Intel in 1978 –LAN standards define MAC and physical layer connectivity IEEE (CSMA/CD - Ethernet) standard – originally 2Mbps IEEE 802.3u standard for 100Mbps Ethernet IEEE 802.3z standard for 1,000Mbps Ethernet CSMA/CD: Ethernet’s Media Access Control (MAC) policy –CS = carrier sense Send only if medium is idle –MA = multiple access –CD = collision detection Stop sending immediately if collision is detected

CS The Old Ethernet (“10Base2”)

CS Ethernet Overview Bandwidths: 10Mbps, 100Mbps, 1Gbps Max bus length: 2500m –Upto 3 repeaters  Max 10KM Bus and Star topologies are used to connect hosts –Hosts attach to network via Ethernet transceiver or hub or switch Detects line state and sends/receives signals –All hosts on an Ethernet are competing for access to the medium Switches break this model Problem: Distributed algorithm that provides fair access

CS Ethernet Overview (contd.) Ethernet by definition is a broadcast protocol –Any signal can be received by all hosts –Switching enables individual hosts to communicate Network layer packets are transmitted over an Ethernet by encapsulating Frame Format Dest addr CRCPreamble Src addr TypeBody 1648

CS Ethernet Frames Preamble is a sequence of 8 bytes, each set to “ ” –Used to synchronize receiver before actual data is sent Addresses –unique, 48-bit unicast address assigned to each adapter example: 0 8:00:e4:b1:02:a1 Each manufacturer gets their own address range –broadcast: all 1 s –multicast: first bit is 1 Type field is a demultiplexing key used to determine which higher level protocol the frame should be delivered to Body can contain up to 1500 bytes of data

CS MAC Algorithm: Receiver Side Receivers  very simple: simply read frames with acceptable address –Address to host –Address to broadcast –Address to multicast to which host belongs –All frames if host is in promiscuous mode

CS Ethernet’s Sender Algorithm CSMA/CD – listens to line before/during sending Sender Behavior (where all the smarts are): If line is idle (no carrier sensed) –send packet immediately –upper bound message size of 1500 bytes –must wait 9.6us between back-to-back frames If line is busy (carrier sensed) –wait until idle and transmit packet immediately called 1-persistent sending If collision detected –Stop sending and jam signal –Try again later

CS State Diagram for CSMA/CD Packet? Sense Carrier Discard Packet Send Detect Collision Jam channel b=CalcBackoff(); wait(b); attempts++; No Yes attempts < 16 attempts == 16

CS Collisions AB AB Collisions are caused when two adaptors transmit at the same time (adaptors sense collision based on voltage differences) Both found line to be idle Both had been waiting to for a busy line to become idle A starts at time 0 Message almost there at time T when B starts – collision! How can we be sure A knows about the collision?

CS Collision Detection Detected collision? Send jamming signal after collision is detected to insure all hosts see collision –32 bit signal –In our example, B sends this How can A know that a collision has taken place? –There must be a mechanism to insure retransmission on collision –A’s message reaches B at time T –B’s message (jamming signal) reaches A at time 2T –So, A must still be transmitting at 2T IEEE specifies max value of 2T to be 51.2us –This relates to maximum distance of 10000m between hosts –At 10Mbps it takes 0.1us to transmit one bit so 512 bits (64B) take 51.2us to send –So, Ethernet frames must be at least 64B long 14B header, 46B data, 4B CRC Padding is used if data is less than 46B

CS Collision Detection contd. AB AB AB time = 0 time = T time = 2T

CS Exponential Backoff If a collision is detected, delay and try again Delay time is selected using binary exponential backoff –1st time: choose K from {0,1} then delay = K * 51.2us –2nd time: choose K from {0,1,2,3} then delay = K * 51.2us –nth time: delay = K x 51.2us, for K=0..2 n – 1 Note max value for k = 1023 –give up after several tries (usually 16) Report transmit error to host If delay were not random, then there is a chance that sources would retransmit in lock step Why not just choose from small set for K –This works fine for a small number of hosts –Large number of nodes would result in more collisions

CS Experiences with the Old Ethernet Ethernets work best under light loads –Utilization over 30% is considered heavy Network capacity is wasted by collisions Most networks are limited to about 200 hosts –Specification allows for up to 1024 Most networks are much shorter –5 to 10 microsecond RTT Transport level flow control helps reduce load (number of back to back packets) Ethernet is inexpensive, fast and easy to administer!

CS Ethernet Problems Ethernet’s peak utilization is pretty low Peak throughput worst with –More hosts More collisions needed to identify single sender –Smaller packet sizes More frequent arbitration –Longer links Collisions take longer to observe, more wasted bandwidth –Efficiency is improved by avoiding these conditions

CS Fast and Gigabit Ethernet Gigabit Ethernet (1,000Mbps) –Compatible with lower speeds –Uses standard framing and CSMA/CD algorithm –Distances are severely limited –Standard on NICs today

CS Why did Ethernet Win? There are LOTS of LAN protocols Price Performance Availability Ease of use Scalability Tomorrow we will talk about physical layer stuff…