Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Review of Networking and Design Concepts There are two ways of constructing a software design:

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Spring 2000CS 4611 Introduction Outline Statistical Multiplexing Inter-Process Communication Network Architecture Performance Metrics.
1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
Review of Topology and Access Techniques / Switching Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Review of Networking and Design Concepts (I) Based in part upon slides of Prof. Raj Jain (OSU),
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Review of Networking Concepts (Part 2) Shivkumar Kalyanaraman Rensselaer Polytechnic Institute.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961:Internet Protocols Quiz 1: Solutions Time: 60 min (strictly enforced) Points: 50 YOUR.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 01-1 System Design and Performance Analysis Concepts Shivkumar Kalyanaraman Rensselaer Polytechnic.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Review of Networking and Design Concepts Two ways of constructing a software design: 1)make it.
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
Review of Networking Concepts
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
Data Communications Architecture Models. What is a Protocol? For two entities to communicate successfully, they must “speak the same language”. What is.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Informal Quiz 1 True or False? T F  The structure of MAC addresses facilitates scalability.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 Internetworking: addressing, forwarding, resolution, fragmentation Shivkumar Kalyanaraman Rensselaer.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 1 (Solutions) Shivkumar Kalyanaraman:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 00-1 ECSE-4730: Computer Communications Networks (CCN): Introduction Shivkumar Kalyanaraman Rensselaer.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
COMPUTER NETWORKS.
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
IP Network Basics. For Internal Use Only ▲ Internal Use Only ▲ Course Objectives Grasp the basic knowledge of network Understand network evolution history.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Midterm Review - Network Layers. Computer 1Computer 2 2.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Internetworking and ATM Lecture 8, April 30, 2003 Data Communications and Networks Mr. Greg Vogl Uganda Martyrs University.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
1 Networking Fundamentals S. Hussain Ali M.S. (Computer Engineering) Department of Computer Engineering King Fahd University of Petroleum and Minerals.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_b Protocol Layering Instructor: Dr. Li-Chuan Chen Date: 09/15/2003 Based in part upon slides of Prof.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Computer Networks with Internet Technology William Stallings
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Computer Security Workshops Networking 101. Reasons To Know Networking In Regard to Computer Security To understand the flow of information on the Internet.
Network Architecture Models School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 2, Thursday 1/18/2007)
1 Physical and Data Link Layer Computer Network System Sirak Kaewjamnong.
TCP/IP Protocol Architecture CSE 3213 – Fall
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #01 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
CCNA Guide to Cisco Networking Chapter 2: Network Devices.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Overview of Ethernet Networking A Rev /31/2011.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Review of Networking and Design Concepts (I): Brief Version Based in part upon slides of Prof.
Data Link Protocols Relates to Lab 2.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Lecture (2).
Networking Devices.
COMPUTER NETWORKS CS610 Lecture-45 Hammad Khalid Khan.
Data Link Issues Relates to Lab 2.
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Network Architecture for Cyberspace
Network Architecture Models
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Network Basics and Architectures Neil Tang 09/05/2008
Presentation transcript:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Review of Networking and Design Concepts There are two ways of constructing a software design: one way is to make it so simple that there are obviously no deficiencies, and the other way is to make it so complicated that there are no obvious deficiencies --- CAR Hoare

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 2 q Networking and Design concepts q Layering: Reference Models q Data link/MAC: q Ethernet/IEEE LANs, SLIP, PPP q Interconnection Devices Many of these concepts are taught in CCN (ECSE-4670) Overview

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 3 Information, Computers, Networks q Information: anything that is represented in bits q Form (can be represented) vs substance (cannot) q All “knowledge” and “control” of physical systems q Theory: Information created when you reduce uncertainty q Properties: q Infinitely replicable q Computers can “manipulate” information q Networks create “access” to information q Potential of networking: q move bits everywhere, cheaply, and with desired performance characteristics

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 4 Network provides access or connectivity... q Building Blocks q links: coax cable, optical fiber... q nodes: general-purpose workstations... q Direct Links q point-to-point q multiple access

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5 q Indirect Connectivity q switched networks q inter-networks

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 6 What is “connectivity” ? q Direct or indirect “access” to every other node in the network q Access is not the same as having a pt-pt link q What you get is a “virtual channel” between nodes, which does not necessarily have the same performance characteristics of a physical link. q For example, a virtual channel may minimally provide only “best-effort connectivity on a packet-by-packet basis” whereas a link provides an "always-connected, fixed bandwidth, fixed delay and near zero-jitter" channel. q Virtualization is made up of two parts: q Multiplexing q Indirection q But lets take a break and understand impt design concepts

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 7 System Design Ideas q Resources: q space q time q computation q money q labor q Design a system to tradeoff cheaper resources against expensive ones (for a gain)

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 8 Multiplexing q Multiplexing = sharing q Trades time and space for money q Cost: waiting time (delay), buffer space, loss (if not enough buffer) q Gain: Money ($$) => Overall system costs less q Eg: Time-Division Multiplexing (TDM), Frequency- Division Multiplexing (FDM)

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 9 Statistical Multiplexing q Reduce resource requirements by exploiting statistical knowledge of the system. Specifically, choose service rate such that: q average rate <= service rate <= peak rate q Multiplexing Gain = peak rate/service rate. q Cost: buffering, delays for applications. Tradeoff space and time resources for money q Useful only if peak rate differs significantly from average rate.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 10 Example system: Circuit Switching q Circuit-switching: resource (circuit) reservation followed by time-bound transmission. q Resources wasted if unused: expensive. q Straightforward to assure quality for voice (150 ms round trip delay, 64 Kbps bandwidth). q Time slots have no meta-data (header) associated. All relevant meta-data is inferred from timing and state installed during circuit/connection-setup.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 11 Example system: Packet-switching q Packet-switching: packets with meta-data (header) and store-and-forward type transmission. q Very efficient – can exploit multiplexing gains both in space and time (see below). q Cost: self-descriptive header per-packet, buffering and delays for applications. (tradeoff space and time for money)

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 12 Spatial and Temporal Multiplexing q Spatial muxing: Decrease resource sizing expecting smaller set of sources to be active at any time instant. q Cost: call-blocking (time) q Temporal muxing: even if many are active at any particular time instant, expect that the average over time will be much smaller. q Cost: buffers and meta-data (headers) in packets (space). q Note: We need packet switching to exploit both spatial and temporal gains.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 13 Virtualization q The multiplexed shared resource may seem like a unshared virtual resource provided we have a level of indirection q I.e. Multiplexing + indirection = virtualization q We can “refer” to the virtual resource as if it were the physical resource. q Indirection requires binding and unbinding… q Examples: q A queueing system: a virtual server for each named source q A Switch/Router/Bridge with a forwarding table (indirection) provide virtual links between any two ports. q The Internet uses control protocols like routing/ARP to establish indirections (name->address->lower layer address- >next hop) to create virtual links between any two users/apps

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 14 Virtualization q Virtualization: If Quality of Service (QoS) is met, the multiplexed shared resource may seem like a unshared virtual resource. q Multiplexing + indirection = virtualization, i.e., refer the virtual resource as if it were the physical resource itself. q Eg: virtual memory, virtual circuit, socket ports in BSD, telephone call. q Indirection requires binding and unbinding...

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 15 Circuit, Virtual-ckt, Connection- Oriented, Connectionless q Circuit: Telephone system q Path setup and resources reserved before data is sent q Data need not have meta-info at all. Only timing. q Virtual Circuit: ATM networks q Multiple circuits on one wire. q Connection-Oriented: TCP q Have an association between end-points q Connectionless: Also known as datagram. IP, postage service q Complete address on each packet q The address decides the next hop at each routing point

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 16 Formal framework: Protocols q Building blocks of a network architecture q Each protocol object has two different interfaces q service interface: defines operations on this protocol q peer-to-peer interface: defines messages exchanged with peer q Term “protocol” is overloaded q specification of peer-to-peer interface q module that implements this interface

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 17 Formal framework: Interface design q Interface between layers is also called the “architecture” q Use abstractions to hide complexity q Allows a subroutine abstraction between a layer and its adjacent layers. q Interface design crucial because interface outlives the technology used to implement the interface. q Driven by three factors: q Functionality (what features the customer wants) q Technology (what’s possible. Building blocks and techniques) q Performance (How fast etc… User, Designer, Operator)

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 18 Techniques:Pipelining and Parallelism q Goal: trading computation for (gain in) time. q Degree of parallelism: response time x throughput q Linear speedup: split up task into N independent subtasks, each requiring same amount of time. q Response time speedup of N. Throughput constant. Degree = N q Pipelining: Can't independently split subtasks - the subtasks may be serially dependent. q We can get speedup in throughput, but NOT in response time by using pipelining

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 19 Techniques: Batching q Goal: trading response time for (gain in) throughput q Batching is good when: q overhead per task increases less than linearly w/ number of tasks q time to accumulate a batch is not too long. q Response time can be traded off q Eg: Interrupt handling, Silly window avoidance in TCP q TCP also has triggers to avoid batching for telnet packets -- when response time is important

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 20 Techniques: Randomization q Goal: Trade computation for (response) time q Used in breaking ties without biases or high probability of repeat of tie. q Eg: Use of exponential backoff in broadcast multiple access (ethernet), avoidance of ACK or NAK implosion in reliable multicast, or in some routing algorithms.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 21 Techniques: Locality and Hierarchy q Locality: Critical in exploiting smaller, faster resource to create an illusion of a larger, faster resource. q The larger, slower resource, is accessed when item is not found in the smaller resource. q Hierarchy: for scalability. q Loose hierarchies more efficient than strict ones (eg: children can interconnect). q Eg: managing name space or address allocation and forwarding.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 22 Miscellaneous techniques q Different types of hierarchy: topological, routing, traffic management, organizational. q Separating data and control: Per-packet actions are part of critical data path -- fewer control actions => greater forwarding speed. q Greater separation of data and control => need to install more state in the network. q Eg: separate CCIS channel in telephony. q Eg: separate routing protocols in Internet. q Extensibility: hooks for future growth. Eg: version field, reserved fields.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 23 Performance, Metrics and Parameters System Parameters or Factors Metrics q Performance: q How fast does computer A run MY program ? q Is machine A generally faster than machine B, and if so, how much faster ? q Parameters: clock rate, poisson inter-arrivals... q Metrics: throughput, response time, queue length... q Metric should characterize the design tradeoffs adequately q Metrics are usually functions of many factors. Use of one factor alone may be misleading.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 24 More on Metrics/Parameters q User metrics: q How fast does MY program run => we need a measure of execution time ? q System metrics: q How much is the system utilized ? q How much buffers do I need to provision ? q How many programs is it able to execute per second ? q => Need a measure of throughput, queue length q Eg: Execution Time = Instrns/pgm *avg clock cycles/Instruction * time/clock cycle. q T = I /P * CPI *Clock cycle time q All three factors combine to affect the metric.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 25 Workloads, Benchmarks q Workload: a test case for the system q Benchmark: A set of workloads which together is representative of “MY program”. Should be reproduceable q Problem: combining metrics from each test case. q Pitfalls: ratio games. Machine A B Test case 1 1s 10s 2 100s 10s Which is faster, A or B ?

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 26 Effect on Design: Amdahl’s law q Execution time after improvement = Execution time affected by improvement / speedup + Unaffected execution time q Point: Speedup the common case !!

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 27 Perspective q Network users: services and performance that their applications need, e.g., guarantee that each message it sends will be delivered without error within a certain amount of time q Network designers: cost-effective design e.g., that network resources are efficiently utilized and fairly allocated to different users q Users + designer perspectives enough to meet 3 factors of interface/architecture design. But... q Network providers: system that is easy to administer and manage e.g., that faults can be easily isolated and it is easy to account for usage q Require management tools and interfaces. q Often considered to the basic protocol interface design

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 28 Key networking concepts q Layering: interfaces, services, peer-peer protocols. q Encapsulation: (de)multiplexing, overlays q Addressing/Naming: address/name resolution, hierarchical vs flat addresses, routing, conn’n setup q Communication type: message passing, packet switching, connection-oriented, connectionless q Error & flow control: framing, CRC, retransmission, backoff, sliding window ARQ protocols. q Media access: shared, switched, collision, carrier sense, collision detect, multiple access, slots, tokens q Interconnect devices: repeaters, hubs, bridges, switches, routers, application gateways

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 29 Reference Models for Layering Application Presentation Session Transport Network Datalink Physical Application Transport Internetwork Host to Network FTP TCP IP Ether net TelnetHTTP UDP Packet Radio Point-to- Point TCP/IP Ref ModelOSI Ref ModelTCP/IP Protocols Where did the problems these layers solve spring up from ?

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 30 Issues in a point-to-point network... q Physical layer: coding, modulation etc q Link layer: framing, protocol multiplexing, error recovery, flow control… q No need for protocol flab like addressing, names, routers, hubs etc AB

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 31 Connecting N users: Directly... q Bus: broadcast, collisions, media access control q Full mesh: Cost, simplicity... Full mesh Bus

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 32 Connecting N users: Indirectly... q Star: One-hop path to any node, reliability, forwarding function q Tree: Minimal links, multiple hop-paths, distributed load q Ring: Reliability to link failure, near-minimal links etc q Hybrid q All these topologies (“multi-access networks”) assume a single physical network, not a network of networks Ring Tree Star

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 33 Multi-access networks (contd) q Topology issues: Cost, reliability, manageability, deployability, scalability, software complexity q Medium Access Protocols: q ALOHA q CSMA/CD (Ethernet) q Token Ring q Wireless q New concepts: address, forwarding (and forwarding table), bridge, switch, hub, token, medium access control (MAC) protocols

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 34 Internetworking q What is it ? q “Connect many disparate physical networks and make them function as a coordinated unit … ” - Douglas Comer q Results: q Universal Interconnection q User interface is network independent q All sub-networks are equal in the eyes of TCP/IP q Killer apps: , WWW

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 35 Inter-networks: networks of networks q Internetworking involves two fundamental problems: heterogeneity and scale q Concepts: q Translation, overlays, address & name resolution, fragmentation: to handle heterogeneity q Hierarchical addressing, routing, naming, address allocation, administration: to handle scaling

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 36 Multiple Access Protocols q Aloha at University of Hawaii: Transmit whenever you like Worst case utilization = 1/(2e) =18% q CSMA: Carrier Sense Multiple Access Listen before you transmit q CSMA/CD: CSMA with Collision Detection Listen while transmitting. Stop if you hear someone else. q Ethernet uses CSMA/CD. Standardized by IEEE committee.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 37 10Base5 Cabling Rules q Thick coax q Length of the cable is limited to 2.5 km, no more than 4 repeaters between stations  No more than 500 m per segment  10Base5 q No more than 2.5 m between stations q Transceiver cable limited to 50 m 2.5m 500 m Repeater Terminator Tranceiver

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 38 Interconnection Devices q Repeater: PHY device that restores data and collision signals: a digital amplifier q Hub: Multi-port repeater + fault detection q Bridge: Data link layer device connecting two or more collision domains. MAC multicasts are propagated throughout “extended LAN.” q Router: Network layer device. IP, IPX, AppleTalk. Does not propagate MAC multicasts. q Switch: Multi-port bridge with parallel paths These are functions. Packaging varies.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 39 Interconnection Devices HH B HH Router Extended LAN =Broadcast domain LAN= Collision Domain Network Datalink Physical Transport Router Bridge/Switch Repeater/Hub Gateway Application Network Datalink Physical Transport Application

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 40 Ethernet (IEEE 802) Address Format q G/L bit: q Global: unique worldwide; assigned by IEEE q Local: Software assigned q G/I: bit: q I: unicast address q G: multicast address q Eg: Multicast = “To all bridges on this LAN” q All 1s => Broadcast = “To all stations” G/L bit (Global/Local) G/I bit (Group/Individual) OUI (Organizationally Unique ID)

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 41 Frame Format q Ethernet q IEEE Dest. Address Source Address Type 662 Size in bytes Dest. Address Source Address Length Info 662 IPIPXAppleTalk LLC IPIPXAppleTalk CRC 4 4 Pad Length Info

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 42 Serial IP (SLIP) q Simple: only framing = Flags + byte-stuffing q Compressed headers (CSLIP) for efficiency on low speed links for interactive traffic. q Problems: q Need other end’s IP address a priori (can’t dynamically assign IP addresses) q No “type” field => no multi-protocol encapsulation q No checksum => all errors detected/corrected by higher layer. q RFCs: 1055, 1144

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 43 PPP q Frame format similar to HDLC q Multi-protocol encapsulation, CRC, dynamic address allocation possible q key fields: flags, protocol, CRC (fig 2.3) q Asynchronous and synchronous communications possible q Link and Network Control Protocols (LCP, NCP) for flexible control & peer-peer negotiation q Can be mapped onto low speed (9.6Kbps) and high speed channels (SONET) q RFCs: 1548, 1332

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 44 MTU q Maximum Transmission Unit q Key link layer characteristic which affects IP performance. q (IP datagram size > MTU) => fragment => inefficient q Path MTU: smallest MTU on any traversed link on path => TCP/IP can be more efficient knowing this. q Reducing MTU for a low speed CSLIP line can lead to lesser transmission/propagation times for interactive traffic

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 45 Summary: Laundry List of Problems q Topologies, Framing, Error control, Flow control q Multiple access q How to share a wire q Switching, bridging, routing q Naming, addressing q Resolution (name/address), fragmentation q Congestion control, traffic management, Reliability q Network Management