CSE331: Introduction to Networks and Security Lecture 5 Fall 2002.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Chapter 2: Direct Link Networks (continued) Slide Set 5.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 4 – Ethernet frame.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
CSE331: Introduction to Networks and Security Lecture 6 Fall 2002.
Spring 2003CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
ECE358: Computer Networks Spring 2012
Distributed Systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 3 – Introduction to Ethernet.
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
Spring 2006CS 3321 Chapter 2 Tidbits Outline A little hardware Ethernet Realistic data transfer rates.
Chapter 5 outline 5.1 Introduction and services
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CECS 474 Computer Network Interoperability Notes for Douglas E. Comer, Computer Networks and Internets (5 th Edition) Tracy Bradley Maples, Ph.D. Computer.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
CWNA Guide to Wireless LANs, Second Edition
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
CSE 461 University of Washington1 Topic How do nodes share a single link? Who sends when, e.g., in WiFI? – Explore with a simple model Assume no-one is.
14-Oct-15Computer Networks1 Reliable Transmission.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
1 Other LANs Token Rings Wireless –Wireless LAN (802.11, WiFi) –Broadband Wireless (802.16) –Bluetooth.
1Ethernet Lecture # 12 Computer Communication & Networks.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
Mozafar Bag-Mohammadi University of Ilam
WLAN.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Transport Layer: Sliding Window Reliability
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 Ethernet History –developed by Xerox PARC in mid-1970s –roots in Aloha packet-radio network –standardized by Xerox, DEC, and Intel in 1978 –similar to.
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
2. GETTING CONNECTED (PART 2) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 26 January
1 Direct Link Networks: Reliable Transmission Sections 2.5.
CSE331: Introduction to Networks and Security Lecture 4 Fall 2002.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Lec # 23 Data communucation Muhammad Waseem Iqbal 1ethernet.
Ch. 16 Ethernet Traditional Ethernet IEEE Medium Access Control –Carrier Sense Multiple Access with Collision Detection (CSMA/CD) –The most.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
CS380 Int. to Comp. Networks Data Link Networks - Part II1 Reliable Transmission How to fix corrupted frames. –Error correcting codes too expensive –Should.
The University of Adelaide, School of Computer Science
The University of Adelaide, School of Computer Science
Getting Connected (Chapter 2 Part 3)
Wireless LANs Wireless proliferating rapidly.
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
EEC-484/584 Computer Networks
Getting Connected (Chapter 2 Part 3)
Reliable transmission
Protocol layering and data
EEC-484/584 Computer Networks
Protocol layering and data
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
Ethernet 16EC351 Computer networks unit II Mr.M.Jagadesh,AP/ECE.
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
Presentation transcript:

CSE331: Introduction to Networks and Security Lecture 5 Fall 2002

CSE331 Fall Announcements Project 1 will be handed out this Friday –Form groups of two or three –Mail group members to Aditya –If you can’t find a partner, mail Aditya –Groups should be formed before project is handed out

CSE331 Fall Recap Stop & Wait Sliding Window

CSE331 Fall Today Finish up sliding window discussion Ethernet

CSE331 Fall Variants on Sliding Window Receiver doesn’t transmit redundant ACKs Receiver transmits selective ACKS –ACK indicates exactly which frames have been accepted

CSE331 Fall Window Sizes If RTT x Bandwidth product is known then SWS = RTT x Bandwidth / Framesize Receive window size: –1 = no buffering of out-of-order frames –RWS = SWS buffers as many as can be in flight –Note that RWS > SWS is not sensible

CSE331 Fall Finite Sequence Numbers Recall that for Stop-and-Wait we needed two sequence numbers. How many do we need for Sliding Window? Suppose SWS=RWS –How many sequence numbers should there be? –Is SWS + 1 sufficient?

CSE331 Fall Sufficient MaxSeqNum Frame i’s sequence num is i%MaxSeqNum Assuming SWS = RWS SWS < (MaxSeqNum + 1)/2 Why? –Consider case where all the ACKS are lost. –Suppose SWS = RWS = 3 –MaxSeqNum = 5 (sequence numbers = 0,1,2,3,4) is insufficient

CSE331 Fall Roles of Sliding Window Algorithm Reliable delivery –It provides an efficient retransmission protocol for dealing with errors In-order delivery –The receiver buffers frames and delivers them in sequence number order Flow control –It sends ACKs back to give hints to sender –More sophisticate version could give # of frames the receiver has room for—throttles the sender.

CSE331 Fall Sliding window in practice TCP (Transmission Control Protocol) –Transportation layer protocol –Uses sliding window algorithm –More complex because it’s used in an Internetwork – not over a direct link –Bandwidth x delay not known –Dynamically changes timeouts –Larger buffers for in-order delivery

CSE331 Fall Ethernet (802.3) Developed in mid-70’s at Xerox PARC –Descendent of Aloha, a U. of Hawaii radio packet network –DEC, Intel, and Xerox standard: 1978 for 10Mbps –IEEE standard grew out of that Variants –10Mbps – Multiple Access direct link protocol –100Mbps/1Gbps – designed for point-to-point What are these 802.xx things, anyway? –IEEE working group number –Standardize the protocol

CSE331 Fall Ethernet Physical links Originally used “Thick-net” 10Base5 –10 = 10Mbps –Base = Baseband (as opposed to Broadband) –5 = maximum of 500 meters segments –Up to 4 repeaters between two hosts=2500m max 10Base2 “Thin-net” More common today: 10BaseT –T = Twisted pair (typically Category 5) –Much thinner (easier to use) –Maximum of 100 meter segments –Connected via hubs (still 2500m max)

CSE331 Fall Ethernet topologies Host 10Base5 topology Hub 10BaseT topology Repeater

CSE331 Fall Collision Domains The Ethernet link is shared A signal transmitted by one host reaches all hosts CSMA/CD –Carrier Sense, Multiple Access, with Collision Detection Hosts competing for the same link are said to be in the same collision domain –Good news: easy to exchange data –Bad news: have to regulate link access –MAC: Media Access Control

CSE331 Fall Ethernet Frame Format Preamble – repeating pattern of 0’s & 1’s –Used by receiver to synchronize on signal Dest and Src – Ethernet Addresses Type – demultiplexing key –Identifies higher-level protocol Body – payload –Minimum 46 Bytes –Maximum 1500 Bytes PreambleDest SrcTypeBodyCRC

CSE331 Fall Ethernet Addresses Every adapter manufactured has a unique address –6 bytes (48 bits) usually written in Hex. –Examples: B and 8:0:2b:e4:b1:2 –Each manufacturer is assigned 24bit prefix –Manufacturer ensures unique suffixes First bit = 0 indicates unicast address First bit = 1 indicates multicast address All bits = 1 indicates a broadcast address

CSE331 Fall An Ethernet Adapter Receives Frames addressed to its own address Frames addressed to the broadcast address Frames sent to a multicast address –If it has been programmed to listen to that address All frames –If the adapter has been put into promiscuous mode

CSE331 Fall Ethernet Transmitter Algorithm If the link is idle transmit the frame immediately –Upper bound on frame size means adapter can’t hog the link If the link is busy –Wait for the line to go idle –Wait for 9.6  s after end of last frame (sentinel) –Transmit the frame Two (or more) frames may collide –Simultaneously sent frames interfere

CSE331 Fall Collision Detection When an adapter detects a collission –Immediately sends 32 bit jamming signal –Stops transmitting Adapter may need to send 512 bits in order to detect a collision –Why? –2500m + 4 repeaters gives RTT of 51.2  s –51.2  s at 10Mbps = 512 bits –Fortunately, minimum frame (excluding preamble) is 512 bits = 46 bytes data + 14 bytes header + 4 bytes CRC

CSE331 Fall Ethernet Collision (Worst Case) T=  s 51.2  s

CSE331 Fall Exponential Backoff After it detects 1 st collision –Adapter waits either 0 or 51.2  s before retrying –Selected randomly After 2 nd failed transmission attempt –Adapter randomly waits 0, 51.2, 102.4, or  s After n th failed transmission attempt –Pick k in 0 … 2 n -1 –Wait k x 51.2  s –Give up after 16 retries (but cap n at 10)

CSE331 Fall Ethernet Security Issues Promiscuous mode –Packet sniffer detects all Ethernet frames Less of a problem in switched Ethernet

CSE331 Fall Wireless (802.11) Spread spectrum radio –2.4GHz frequency band Bandwidth ranges 1, 2, 5.5, 11Mbps Like Ethernet, has shared medium –Need MAC (uses exponential backoff) Unlike Ethernet, in –No support for collision detection –Not all senders and receivers are directly connected

CSE331 Fall Hidden nodes A and C are hidden with respect to each other –Frames sent from A to B and C to B simultaneously may collide, but A and C can’t detect the collision. ACB AC

CSE331 Fall Exposed nodes B is exposed to C –Suppose B is sending to A –C should still be allowed to transmit to D –Even though C—B transmission would collide –(Note A to B transmission would cause collision) ACB ACD

CSE331 Fall Multiple Access Collision Avoidance Sender transmits Request To Send (RTS) –Includes length of data to be transmitted –Timout leads to exponential backoff (like Ethernet) Receiver replies with Clear To Send (CTS) –Echoes the length field Receiver sends ACK of frame to sender Any node that sees CTS cannot transmit for durations specified by length Any node that sees RTS but not CTS is not close enough to the receiver to interfere –It’s free to transmit

CSE331 Fall Wireless Access Points Distribution System – wired network infrastructure Access points – stationary wireless device Roaming wireless Distribution System AP1 AP2 AP3A B C D

CSE331 Fall Selecting an Access Point Active scanning –Node sends a Probe frame –All AP’s within reach reply with a Probe Response frame –Node selects an AP and sends Association Request frame –AP replies with Association Response frame Passive scanning –AP periodically broadcasts Beacon frame –Node sends Association Request

CSE331 Fall Node Mobility B moves from AP1 to AP2 B sends Probes, eventually prefers AP2 to AP1 Sends Association Request Distribution System AP1 AP2 AP3A B C D B

CSE331 Fall Security Issues Packet Sniffing is worse –No physical connection needed –Long range (6 blocks) –Current encryption standards (WEP) not that good Denial of service –Association (and Disassociation) Requests are not authenticated We’ll talk more about these issues in the security part of the course.