EEC-484/584 Computer Networks Lecture 8 Wenbing Zhao

Slides:



Advertisements
Similar presentations
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
Advertisements

The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
The Data Link Layer introduction point-to-point data link protocols
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 10 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Teknik Akses Jaringan Carrier Sense Pertemuan 12 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
EEC-484/584 Computer Networks Lecture 8 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 9 Wenbing Zhao (Part of the slides are based on materials supplied by Dr. Louise Moser at UCSB and.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Link-layer EE122 Discussion 10/14/2011. MAC Addresses Link-layer deals with MAC addresses – 48-bit addresses, flat name space – E.g., 88-9F-FA-F
Network Layer4-1 Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving side,
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Ethernet, ARP.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
TELE202 Lecture 10 Internet Protocols (2) 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Internet Protocols (1) »Source: chapter 15 ¥This Lecture »Internet.
DHCP: Dynamic Host Configuration Protocol
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Bootstrap and Autoconfiguration (DHCP)
Network Layer – Subnetting and Control Protocols Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing,
23-Support Protocols and Technologies Dr. John P. Abraham Professor UTPA.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
Links Mike Freedman COS 461: Computer Networks Lectures: MW 10-10:50am in CS 104
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
Network Layer4-1 Lower limit on the number of check bits r We want to design a code m with m message bits and r check bits Allowing all single errors to.
Sublayers Under the Network Layer: BOOTP & DHCP
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Connecting The Network Layer to Data Link Layer. ARP in the IP Layer The Address Resolution Protocol (ARP) The Address Resolution Protocol (ARP) Part.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
1 Network Administration Module 3 ARP/RARP. 2 Address Resolution The problem Physical networks use physical addresses, not IP addresses Need the physical.
1 Network Layer Lecture 12 Imran Ahmed University of Management & Technology.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
EEC-484 Computer Networks Lecture 13 Wenbing Zhao 12/6/20151.
Ch 5. The Link Layer and Local Area Networks Myungchul Kim
Ethernet Overview it the IEEE standard for Ethernet.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
The Medium Access Control Sublayer
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
EEC-484/584 Computer Networks
Lab 7 – CSMA/CD (Data Link Layer Layer)
BOOTP and DHCP Objectives
CS 457 – Lecture 6 Ethernet Spring 2012.
Services of DLL Framing Link access Reliable delivery
ARP: Address Resolution Protocol
EEC-484/584 Computer Networks
Wide Area Networks and Internet CT1403
1 ADDRESS RESOLUTION PROTOCOL (ARP) & REVERSE ADDRESS RESOLUTION PROTOCOL ( RARP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University,
EEC-484/584 Computer Networks
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

EEC-484/584 Computer Networks Lecture 8 Wenbing Zhao

2 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Outline Reminder: –3/3 (Monday): Lab #3 –3/5 (Wednesday): Quiz #2 CSMA protocols Manchester Encoding The Ethernet MAC Sublayer Protocol The Binary Exponential Backoff Algorithm Switched Ethernet ARP and DHCP

3 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Carrier Sense Multiple Access When station has data to send, listens to channel to see if anyone else is transmitting If channel is idle, station transmits a frame Else station waits for it to become idle If collisions occurs, station waits random amount of time, tries again Also called 1-persistent CSMA –With probability 1 station will transmit if channel is idle

4 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao After a station starts sending, it takes a while before 2nd station receives 1st station ’ s signal –2nd station might start sending before it knows that another station has already been transmitting If two stations become ready while third station transmitting –Both wait until transmission ends and start transmitting, collision results Carrier Sense Multiple Access: Collision Still Possible

5 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao p-persistent CSMA: Reduce the Probability of Collision Sense continuously, but does not always send when channel is idle –Applicable for slotted channels When ready to send, station senses the channel –If channel idle, station transmits with probability p, defers to next slot with probability q = 1-p –Else (if channel is busy) station waits until next slot tries again –If next slot idle, station transmits with probability p, defers with probability q = 1-p –…–…

6 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Non-Persistent CSMA Does not sense continuously, send if it senses the channel is idle Before sending, station senses the channel –If channel is idle, station begins sending –Else station does not continuously sense, waits random amount of time, tries again

7 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Persistent and Nonpersistent CSMA Improves over ALOHA because they ensure no station to transmit when it senses channel is busy

8 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Manchester Encoding Binary encoding –Hard to distinguish 0 bit (0-volt) from idle (0-volt) –Requires clocks of all stations synchronized Manchester encoding and differential Manchester encoding

9 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Ethernet Frame Structure Preamble: for clock synchronization –First 7 bytes with pattern , last byte with pattern –The two consecutive 1 ’ s indicate the start of a frame How can the receiver tell the end of the frame? –No current on the wire >= 64 bytes Not considered as part of the header!

10 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Ethernet Frame Structure Destination address: 6 bytes (48 bits) –Highest order bit: 0 individual, 1 multicast; all 1 ’ s broadcast –Frames received with non-matching destination address is discarded Type: type of network layer protocol Pad – used to produce valid frame >= 64 bytes Checksum – 32-bit cyclic redundancy check

11 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Ethernet MAC Sublayer Protocol Uses 1-persistent CSMA/CD Binary exponential backoff Provides unreliable connectionless service

12 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao CSMA with Collision Detection If two stations start transmitting simultaneously, both detect collision and stop transmitting Minimum time to detect collision = time for signal to propagate Monitor collision while sending –Minimum time to detect collision => minimum frame length

13 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Minimum Time to Detect Collision To ensure the sender can detect collision –All frames must take more than 2  to send so that transmission is still taking place when the noise burst gets back to the sender

14 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Randomization and Binary Exponential Backoff Time divided into slots –Length of slot = 2  = worst-case round-trip propagation time –To accommodate longest path, slot time = 512 bit times = 51.2  sec (10Mbps Ethernet) Binary exponential backoff

15 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Randomization and Binary Exponential Backoff After 1 st collision, station picks 0 or 1 at random, waits that number of slots and tries again After 2 nd collision, station picks 0,1,2,3 at random, waits that number of slots and tries again …. After i-th collision, station picks 0,1, …,2 i -1 at random, … If 10 <= i < 16, station picks 0,1, …, at random If i=16, controller reports failure to computer

16 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Ethernet Performance Binary exponential backoff results in –Low delay when few stations collide –Reasonable delay for collision resolution when many stations collide When other factors are fixed, channel efficiency decreases when –Network bandwidth increases –Cable length increases –Number of stations increases –Frame length decreases

17 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Ethernet Performance Efficiency of Ethernet at 10 Mbps with 512-bit slot times

18 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Switched Ethernet Switch – contains a high-speed backplane and room for typically 4 to 32 plug-in line cards, each containing 1-8 connectors –Possibly each card forms its own collision domain, or –Full-duplex operation if each input port is buffered

19 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao ARP – Address Resolution Protocol How do IP addresses get mapped onto data link layer addresses, such as Ethernet?

20 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao ARP Optimization ARP result is cached (step 5 in figure) When A wants to communicate with B, A includes its IP-to-Ethernet mapping in the ARP packet so that B knows the mapping right away (step 3 in figure) Have every machine broadcast its mapping when it boots, so that everyone else knows the mapping To accommodate changes, entries in the ARP cache time out after a few minutes

21 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao ARP: How to Handle Remote Traffic Proxy ARP – A router is configured to answer ARP requests on one of its networks for a host on another network

22 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao ARP – Exercise Node 1 wants to send a packet to node 3, what will be returned by ARP? Node 1 wants to send a packet to node 2, what will be returned by ARP?

23 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao RARP – Reverse Address Resolution Protocol RARP - Allows a newly-booted diskless- workstation (e.g., X terminal) to broadcast its Ethernet address and ask for its IP address –RARP server responds to a RARP request with the assigned IP address 32-bit Internet address 48-bit Ethernet address ARP RARP

24 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Limitations of RARP RARP uses a link-layer broadcast, RARP requests are not forwarded by routers, therefore, an RARP server must be present on every network The only thing returned by the RARP server is the IP address

25 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao BOOTP – Bootstrap Protocol BOOTP – uses UDP –A client broadcasts to –The source IP address is set to if client does not know its own IP address yet –Port number: 67 for server, 68 for client BOOTP drawbacks –Requires manual configuration of tables mapping IP address to Ethernet address at the BOOTP server Replaced by DHCP

26 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Dynamic Host Configuration Protocol Allow host to dynamically obtain its IP address from network server when it joins network –IP address assignment is lease-based (to cope with client failure, also enables reuse of addresses) –Can renew its lease on address in use DHCP overview (UDP is used for communication) –Host broadcasts “DHCP discover” msg –DHCP server responds with “DHCP offer” msg –Host requests IP address: “DHCP request” msg –DHCP server sends address: “DHCP ack” msg

27 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao DHCP Client-Server Scenario A B E DHCP server arriving DHCP client needs address in this network

28 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao DHCP Client-Server Scenario DHCP server: arriving client time DHCP discover src : , 68 dest.: ,67 yiaddr: transaction ID: 654 DHCP offer src: , 67 dest: , 68 yiaddr: transaction ID: 654 Lifetime: 3600 secs DHCP request src: , 68 dest:: , 67 yiaddr: transaction ID: 655 Lifetime: 3600 secs DHCP ACK src: , 67 dest: , 68 yiaddr: transaction ID: 655 Lifetime: 3600 secs

29 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao DHCP Replay A DHCP relay agent can be configured on each LAN The agent stores the IP address of the DHCP server and forward the request to the server

30 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao DHCP with Replay Agent To find its IP address, a newly-booted machine broadcasts a DHCP Discover packet The DHCP relay agent on its LAN receives all DHCP broadcasts On receiving a DHCP Discover packet, the agent sends the packet as a unicast packet to the DHCP server, possibly on a distant network

31 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Exercise An IP packet to be transmitted by Ethernet is 60 bytes long. Is padding needed in the Ethernet frame, and if so, how many bytes?

32 Spring Semester 2008EEC-484/584: Computer NetworksWenbing Zhao Exercise Consider building a CSMA/CD network running at 1 Gbps over a 1-km cable. The signal speed in the cable is 200,000 km/sec. What is the minimum frame size?