Cs/ee 143 Communication Networks Chapter 3 Ethernet Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech.

Slides:



Advertisements
Similar presentations
Communication Networks Recitation 3 Bridges & Spanning trees.
Advertisements

Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
CS 4700 / CS 5700 Network Fundamentals Lecture 7: Bridging (From Hub to Switch by Way of Tree) Revised 1/14/13.
The Data Link Layer introduction point-to-point data link protocols
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
1 Computer Networks Internetworking Devices. 2 Repeaters Hubs Bridges –Learning algorithms –Problem of closed loops Switches Routers.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Link-layer EE122 Discussion 10/14/2011. MAC Addresses Link-layer deals with MAC addresses – 48-bit addresses, flat name space – E.g., 88-9F-FA-F
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Copyright 2003 CCNA 1 Chapter 6, part 2 Ethernet Switching By Your Name.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Medium Access Control Sub Layer
CS3505: Loca Area Networks CSMA/CD : IEEE and LAN Internetworks.
1 Data Link Layer Lecture 23 Imran Ahmed University of Management & Technology.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
Networks. Ethernet  Invented by Dr. Robert Metcalfe in 1970 at Xerox Palo Alto Research Center  Allows group of computers to communicate in a Local.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Link Layer MAC Dr. Mozafar Bag-Mohammadi University of Ilam.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
Winter 2008CS244a Handout 111 CS244a: An Introduction to Computer Networks Handout 11: Interconnecting LANs Nick McKeown Professor of Electrical Engineering.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
CT301 LECTURE 8.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Services of DLL Framing Link access Reliable delivery
CS 4700 / CS 5700 Network Fundamentals
Overview Jaringan Komputer (3)
Announcements Late homework policy New Add Updated on course website
CS 4700 / CS 5700 Network Fundamentals
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Chapter 15. Connecting Devices
Chapter 6 Multiple Radio Access.
Presentation transcript:

cs/ee 143 Communication Networks Chapter 3 Ethernet Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech

Warning These notes are not self-contained, probably not understandable, unless you also were in the lecture They are supplement to not replacement for class attendance

Agenda Ethernet history/devices Switch Ethernet forwarding table Spanning tree protocol Little’s theorem (informal proof)

Ethernet Each (layer 2) network full connectivity: every node can reach every other node broadcast capable: every node (inc. router) can broadcast to all other nodes e.g. Ethernet, WiFi, cable network, etc.

Aloha network (1970) Randomized multiple access Send on frequency f1; receive ack on frquency f2. If no ack after timeout, wait a random time and re-transmit

Aloha network (1970) Randomized multiple access If an ack is not outstanding, transmit immediately If no ack, re-transmit after a random delay

Aloha network (1970) Randomized multiple access Max utilization (prob of success) ~ 1/e ~ 37%

Slotted Aloha utilization Model Slotted time, fixed packet size, n stations 1 slot = 1 pkt transmission time In each slot, each station transmits independently with probability p Prob (slot t has a successful transmission)

Slotted Aloha utilization

Unslotted Aloha utilization Model Fixed packet size, n stations Slotted time of duration  << 1. pkt transmission time = 1/  In each  slot, each station transmits independently with probability p Prob (slot  has a successful transmission)

Unslotted ALOHA utilization Prob (a pkt transmission started in an arbitrary  -slot by station 1 is successful)

Unslotted ALOHA utilization Prob (a pkt transmission started in an arbitrary  -slot by station 1 is successful)

Unslotted ALOHA utilization

Ethernet cable ( ) CSMA/CD (carrier sensing multiple access/collision detection) 1.Wait till channel is idle; wait for a random time. 2.Transmit when the channel is idle following the random wait. 3.Abort if collision is detected, and goto 1.

Ethernet cable ( ) Truncated binary exponential backoff 1.Pick X uniformly at random from {0, 1,..., 2^n-1}, n = min (10, m), m = #collisions. Give up & declare error when m = Wait X x 512 bit times (4,096 bits for 1G) 3.If collide, increment m and repeat.

Ethernet cable ( ) Capture or winner-takes-all effect A station that collides is more likely to pick a larger random backoff time. A station that successfully transmits is more likely to pick a smaller backoff time and hence more likely to successfully transmit again

Ethernet hub (1980s) CSMA/CD as in Ethernet cable

Ethernet hub (1980s) A station waits a random multiples of T = 2 PROP before transmitting When n stations transmit independently with prob p, then prob of success is <= 1/e when n is large Hence avg time till first success = e T Utilization = TRANS / (TRANS + (e-1)T) = 1 / ( A), A = PROP/TRAN

Ethernet switch Ethernet switch eliminates collision, provided switch buffer is big enough.

Ethernet switch: forwarding table (Ethernet) MAC address 1.48 bit 2.Globally unique to MAC device, location independent (c.f. IP) 3.Broadcast address: 48 ones

Ethernet switch: forwarding table x  y: [ y | x | data ]

Agenda Ethernet history/devices Switch Ethernet forwarding table Spanning tree protocol Little’s theorem (informal proof)

Ethernet switch routing: STP Goal Operation Example Performance x  y: [ y | x | data ]

Spanning tree protocol Goal: for all switches in a LAN to compute a shortest-path tree used to route layer-2 packets one tree for entire LAN rooted at the switch with the smallest ID (MAC address) decentralized, asynchronous, robust computation

Spanning tree protocol Three criteria 1.The root switch always forwards messages on all its ports 2.Each switch computes its shortest path (in #bridges) to root 3.All switches connected to a LAN elect a designated switch for the LAN to send packets towards root switch  A switch that is not elected for any of the LANs it is connected to will not receive nor forward any data packet

Spanning tree protocol Switches send packets asynchronously with [ my ID | current root ID | distance to root ] A switch relays packets whose “current root ID” is the smallest it has seen so far (& smaller than its own “current root ID”), and adds 1 to “distance to root” If the “distances to root” on STP packets received by a switch on all its ports are the same or smaller than what it believes its distance is, then the switch stops forwarding … until protocol converges Completely decentralized, asynchronous, robust

STP: example I’m 3 I think root is 3 my distance to root is 0

STP: example I’m 3 I think root is 3 my distance to root is 0

STP: example a new initiation before previous converges

STP: example a new initiation before previous converges

STP: example a new initiation before previous converges

STP: example During transient, B5 may connect to root B1 either via B3 or B4 – which should B5 use? Ans: use switch with a smaller ID (B3)

Spanning tree for all switches x  y: [ y | x | data ]

STP: designated switches B4 believes its distance to root B1 is 2 The STP packets from both its ports have distances equal or less. So it does not forward and is not a designated switch for neither LAN Neither B4 nor B5 will be involved in forwarding data packets

Spanning tree protocol Performance Unique path between every source- destination path Can potentially be bad since 2 switches may communicate only via root  e.g. in a ring of switches, the switch with the largest ID communicates with root via the longest path Penalty is usually not too bad since it is in a LAN

Agenda Ethernet history/devices Switch Ethernet forwarding table Spanning tree protocol Little’s theorem (informal proof)

Little’s law

Queueing system random arrival process with rate random service time with average  Little’s law  Verifies directly for M/M/1, but holds much more generally  Extremely useful because of its generality

M/M/1 queue Poisson arrival process with rate Exponential service time with average

Queueing system random arrival process with rate random service time with average