Computer Networks 0100-Ethernet Gergely Windisch

Slides:



Advertisements
Similar presentations
Topic 7 Local Area Networks (LAN)
Advertisements

Chabot College Chapter 2 Review Questions Semester IIIELEC Semester III ELEC
Introduction to Network-2-. Network types Local Area Network (LAN) High speed, low error data networks that covers small geographic area. There are different.
CSCI 4550/8556 Computer Networks Comer, Chapter 11: Extending LANs: Fiber Modems, Repeaters, Bridges and Switches.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Service Providers & Data Link & Physical layers Week 4 Lecture 1.
1 K. Salah Module 4.3: Repeaters, Bridges, & Switches Repeater Hub NIC Bridges Switches VLANs GbE.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Connecting LANs, Backbone Networks, and Virtual LANs
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Connecting LANs, Backbone Networks, and Virtual LANs
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
10/18/2007 EETS Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chapter 6 – Connectivity Devices
Module 8: Ethernet Switching
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
Link Layer Review CS244A Winter 2008 March 7, 2008 Ben Nham.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks 15-1 Connecting Devices. Connecting Device We divide connecting devices into five different categories based on the layer in which they.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
Semester 3—LAN Switching Chapter 2 Objectives  By the end of this chapter we will be able to perform tasks related to: – Various LAN Communication Problems.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
Cisco Network Devices Chapter 6 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Identify and explain various Cisco.
Computer Networks. Internetworking Devices Network Interface Card (NIC) Repeaters HUB Bridge Switch Router.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
CCNA Guide to Cisco Networking Chapter 2: Network Devices.
Ch 5. The Link Layer and Local Area Networks Myungchul Kim
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Ch. 15 Connecting LANs.
4: DataLink Layer1 Hubs r Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces.
Data Communications is the Real World OSI Layers 1 & 2 a.k.a TCP/IP Network Interface Layer.
Computer Communication and Networking Lecture # 4 by Zainab Malik 1.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Lec # 25 Computer Network Muhammad Waseem Iqbal. Learn about the Internetworking Devices – Repeaters – Hubs – Switches – Bridges – Routers.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Chapter 16– Connecting LANs
Networking Devices.
Part III Datalink Layer 10.
Connecting Devices LANs or WANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs or WANs, we.
Chapter 4 Data Link Layer Switching
Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs
The Medium Access Control Sublayer
CS4470 Computer Networking Protocols
Part III Datalink Layer 10.
Chapter 15. Connecting Devices
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Presentation transcript:

Computer Networks 0100-Ethernet Gergely Windisch

Channel allocation problem Point to point communication is easy – direct link between the communicating parties – anyone can talk whenever they wish Broadcast communication – Not so easy – too many people might want to talk – who can? – if two messages overlap, both are destroyed

How do we allocate the channel to each user? – Static channel allocation - dedicated frequency for each user – good for a small number of users who transmit a large amount – like radio stations not so good for large number of users with burst traffic – Dynamic channel allocation channel is allocated to whoever wants to use it – better for large number of users, but some problems may arise – single channel – collision is bad (but observable) – carrier sense – no carrier sense » whether the sender can listen in on the channel first

ALOHA – 18% Slottet ALOHA – 35% Carrier Sense Multiple Access Protocol – goood – instead of just sending data whenever the urge drives us, let us listen first and if there is silence, then talk

Carrier Sense Multiple Access Protocol Listen first, talk later – but how? – if two computers want to send when a third is talking – they will collide – better: wait a random amount of time before sending Carrier Sense Multiple Access / Collision Detection – like above, but look out for collision and stop sending as soon as it is noted – the message is runined anyway, why waste bandwidth Basis of the classic Ethernet

History of ethernet Invented 40 years ago at Xerox

Ethernet topology Used to be a but Star nowdays

Transport medium Anything goes

CSMA/CD protocol Collisions should be avoided at all cost

Ethernet implementation Thick ethernet – 500 m – 100 hosts Thin ethernet – 100 m – 30 hosts UTP (switched ethernet)

Ethernet frames Bits are transferred, but the bits need some organization

Errors Error detection vs. error correction – error detection can detect errors and the offending message is retransmitted – error correction is better as faulty messages can be corrected, but at what price? Error detection is used on reliable connections, error correction is used on unreliable connections – on unreilable channels even the retransmitted messages will be corrupt – no use having them retransmitted Error correction codes – hamming code – reed solomon code Error detection codes – parity (normal and interleaved) – checksum – cyclic redundancy check (polinomial code)

Devices in an etherenet network hub – first there was the hub bridge – bridge connects two networks switch – switch is like a bridge, but with more legs – (they are essentially the same)

Interesting questions concerning switches What do we want from bridges/switches? – Let them be plug and play – They should send the data only to the appropriate port – When multiple switches are connected they should not form loops as loops are normally fun*, but not in this case When do we want them? – Now How do we do it? – Backward learning – Spanning tree protocol spanning tree is a type of graph without a cycle *: Source:

Switch backward learning Hash table stores computers and ports At first there are no entries in the hash table – messages destined at a host not in the hash table will be sent to all ports – whenever a computer sends a message the source port is extracted and stored Hash table entries are timestamped at each use, old entries are removed to keep the system dynamic and up-to-date Switching can be done as soon as the destination address is available – good thing it is the first one to arrive then – wormhole switching

Switch backward learning Protocol processing in the bridge

Spanning tree protocol Redundant magic Imagine two networks – each have their own switches, and the switches are connected to form an UBER LAN. What happens if a hamster chews the cable between the two? – disaster

Spanning tree protocol Redundant magic Imagine two networks – each have their own switches, and the switches are connected to form an UBER LAN. What happens if a hamster chews the cable between the two? – disaster Let’s connect the switches by multiple cables! – now we would need multiple hamsters, but as there is just one hamster to do the chewing, we are fine

Spanning tree protocol Redundant magic Imagine two networks – each have their own switches, and the switches are connected to form an UBER LAN. What happens if a hamster chews the cable between the two? – disaster Let’s connect the switches by multiple cables! – now we would need multiple hamsters, but as there is just one hamster to do the chewing, we are fine Or are we? – What happens if the machines start communicating?

Spanning tree protocol

How to build spanning tree – Periodically send out messages to all ports, and analyze messages coming from othter routers – Select a root bridge (based on the MAC – smallert MAC ID will be the root) – Find out the shortest paths to the root – Turn off all other links

Spanning tree protocol

Layers and devices Repeaters and hubs do not care about frames, they only care about voltages Standard allows 4 repeaters to extend cable length to 2.5 km – enhance the signal Hubs don’t enhance signal Devices extend the collision domain – CSMA/CD

Layers and devices Switches isolate networks and hosts – no collision domains, no CSMA/CD Originally bridges were created to connect different technologies (eg. Ethernet and token ring) – not used for that any more, but to connect similar LANs

Layers and devices Routers strip the frame and look at the payload, extract IP addresses and do their magic to forward packages. – We’ll look behind the curtains later this semester hopefully

Layers and devices High level stuff, will not even touch with a stick – Application gateway is an -sms gateway for example

Ethernet speeds Original Ethernet – – 10Mbps – Like heaven when first introduced, but even heaven gets boring in a few short years Fast Ethernet – 1995 (IEEE committee – 802.3u) – 100Mbps – compatible to the original in every aspect Gigabit Ethernet – 1999 – 802.3ab – 1000Mbps – compatible to the original in every aspect 10 Gigabit Ethernet, 40 Gigabit, 100 Gigabit – not so compatible anymore (hubs are not allowed)

VLAN VLANs are good – Topology and LAN membership can be independent of geographical location Definition Traffic filtering Access control

VLAN

VLAN ID The ethernet frame had to be modified – frames must be identified as part of a VLAN – but how? – vlan id

Wireless lan Ethernet Wireless network topologies Network security WPA/WPA2