1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,

Slides:



Advertisements
Similar presentations
CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Advertisements

Communication Networks Recitation 3 Bridges & Spanning trees.
University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
Topic 7 Local Area Networks (LAN)
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 19 Introduction to Computer Networks.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
5: DataLink Layer5-1 Mac Addressing, Ethernet, and Interconnections.
Chabot College Chapter 2 Review Questions Semester IIIELEC Semester III ELEC
CPSC 441 TUTORIAL TA: FANG WANG HUBS, SWITCHES AND BRIDGES Parts of the slides contents are courtesy of the following people: Jim Kurose, Keith Ross:
The Data Link Layer introduction point-to-point data link protocols
1 Data Link Layer Ethernet Bridges Token Ring. 2 Summary of MAC protocols What do you do with a shared media? Channel Partitioning: time, frequency or.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
1 Computer Networks Internetworking Devices. 2 Repeaters Hubs Bridges –Learning algorithms –Problem of closed loops Switches Routers.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: Data Link Layer:
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
1 Interconnecting LAN segments Repeaters Hubs Bridges Switches.
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
5: DataLink Layer5a-1 Summary of MAC protocols r What do you do with a shared media? m Channel Partitioning, by time, frequency or code Time Division,Code.
IP Address 0 network host 10 network host 110 networkhost 1110 multicast address A B C D class to to
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
1 Computer Networks LAN Bridges and Switches. 2 Where are we?
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Connecting LANs, Backbone Networks, and Virtual LANs
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
Chapter 5 outline 5.1 Introduction and services
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 26 Omar Meqdadi Department of Computer Science and Software Engineering.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Our Last Class!!  summary  what does the future look like?
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r multiple access protocols and LANs r link layer addressing, ARP r specific link layer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks 15-1 Connecting Devices. Connecting Device We divide connecting devices into five different categories based on the layer in which they.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Computer Networks 15-1 Chapter 15. Connecting LANs, Backbone Networks, and Virtual LANs 15.1 Connecting devices 15.2 Backbone networks 15.3 Virtual LANs.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Multiple Access Links and Protocols
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r link layer services r error detection, correction r multiple access protocols and LANs.
Ch 5. The Link Layer and Local Area Networks Myungchul Kim
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
4: DataLink Layer1 Hubs r Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces.
Computer Communication and Networking Lecture # 4 by Zainab Malik 1.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
Lec # 25 Computer Network Muhammad Waseem Iqbal. Learn about the Internetworking Devices – Repeaters – Hubs – Switches – Bridges – Routers.
4: DataLink Layer1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Computer Communication Networks
Chapter 3 Part 1 Switching and Bridging
MAC Addresses and ARP 32-bit IP address:
Bridging.
Chapter 4 Data Link Layer Switching
Hubs Hubs are essentially physical-layer repeaters:
ARP: Address Resolution Protocol
Chapter 3 Part 1 Switching and Bridging
Hubs Hubs are essentially physical-layer repeaters:
Chapter 15. Connecting Devices
Chapter 5 Data Link Layer – Hub, Switch
Virtual LAN (VLAN).
Presentation transcript:

1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start, end of packet

2 IEEE802.5 standard  AC access control byte:  token bit: value 0 means token can be seized, value 1 means data follows FC  priority bits: priority of packet  reservation bits: station can write these bits to prevent stations with lower priority packet from seizing token after token becomes free  FC frame control: used for monitoring and maintenance

3 IEEE802.5 standard  source, destination address: 48 bit physical address, as in Ethernet  data: packet from network layer  checksum  frame status (FS): set by destination, read by sender  set to indicate destination is up, pkt copied OK from ring  DLC-level ACKing

4 Time Division Multiple Access  TDMA: time division multiple access  access to channel in "rounds"  each station gets fixed length slot (pkt trans time) in each round  unused slots go idle  example: 6-station LAN, 1,3,4 have pkt, 2,5,6 idle Pros and cons:

5 Reservation-based Protocols  want to avoid wasted slots in TDMA  access to channel in rounds (again). Each round:  begins with N short reservation slots  reservation slot time equal to end-end propagation delay of channel  station with message to send posts reservation (1) in its reservation slot  reservation slots seen by all stations  after reservation slots, message transmissions ordered by known priority

6 Pros and cons:

7 Critical Assessment of Multiple Access Protocols Random access: Alohas, CSMA, group Controlled, predetermined: TDMA Controlled demand adaptive: tokens, reservation

8 ARP: Address Resolution Protocol  IEEE802.* (Ethernet, token ring/bus) interface cards only recognize 48-bit IEEE 802. physical layer addresses on packets  network layer uses IP address (32 bits) Q: how to determine physical address of machine with given IP address?

9 ARP : Address Resolution Protocol  A knows B's IP address, wants to learn physical address of B  A broadcasts ARP query pkt, containing B's IP address  all machines on LAN receive ARP query  B receives ARP packet, replies to A with its (B's) physical layer address  A caches (saves) IP-to-physical address pairs until information becomes old (times out) soft state: information that times out (goes away)

10

11 Routing and Physical Layer Addresses: synthesis  P Host A knows router R is next hop to IP destination B:  A creates IP packet with source A, destination B  A uses ARP to get physical layer address of R  A creates Ethernet packet with R's physical address as dest, Ethernet packet contains A-to-B IP packet  A sends Ethernet packet  R receives Ethernet packet  R removes IP datagram from Ethernet packet, sees it is destined to B  R creates physical layer packet, containing A-to-B IP datagram and sends to next router on route to B

12 Interconnecting LANs Why not just one big LAN?  limited amount of supportable traffic: on single LAN, all stations must share bandwidth  limited length: specifies maximum cable length  limited number of stations: 802.4/5 have token passing delays at each station

13 Bridges and Repeaters Bridges versus Repeaters for interconnecting LANs Repeater  copies (amplifies, regenerates) bits between LAN segments  no storage of packets  physical-level (only) interconnection of LANs Bridge  receives, stores, forward (when appropriate) packets between LANs  has two layers of protocol stack: physical and link- level (media access)

14 Bridges versus routers Bridges are arguably routers  know physical layer addresses of stations on each interconnected LAN  receive and selectively forwards packets transmitted on LAN

15 Bridges versus routers Bridges are not routers  no knowledge of "outside world", only stations on interconnected LAN  bridges don't exchange routing tables  deal only with physical layer addresses

16 Bridges: Forward Packets Bridges filter packets  intra-LAN -segment pkts not forwarded onto other LAN segments  inter-LAN-segment pkts must be forwarded, but where?

17 Bridges: Forward Packets Techniques for forwarding packets  flood packets (obvious drawbacks)  router-discovery-like protocol  allows bridge to identify hosts on LAN segment  drawbacks?  bridge "observes" traffic and "learns" which stations are attached  transparent: just add bridge to LAN, all hosts behave as if bridge were not there

18 Bridges: the headaches of 3 LAN standards Computation  bridge may need to translate between standards (each 802.* has different format)  translated packet requires new checksum Speed mismatch  different 802.* LAN's operate at different speeds  what if lots of Ethernet traffic destined to token ring?

19 Bridges: the headaches of 3 LAN standards Size mismatches  has 1518 byte max packet size, has 8191 byte max packet size  what if pkt forwarded onto Ethernet?  fragmentation at physical layer?  drop packet (the IEEE standard) Other mismatches  has priorities; does not ...

20 Switched LAN's  bridges interconnect general 802.* LANs  may require packet conversion Switched Ethernet:  central "hub" interconnects ethernet segments  in practice, each segment often has only one computer  simultaneous transmission to same destination  let first one through  possibly buffer other packets

21 Switched LAN's

22 DLC Summary  point-to-point DLC: "standard" reliable data transfer techniques  the multiple access problem  random access protocols (collisions)  demand adaptive, controlled (collision) free protocols: token passing, mini-slotted reservations  TDMA  IEEE 802.* standards: Ethernet, token bus and ring  bridges, switches for interconnecting LANs

23 Transparent Bridges 1. bridge receives every packet transmitted on every attached LAN 2. bridge stores for each packet  physical address of sender  port (incoming LAN segment) on which pkt was received 3. for each packet received on any port: lookup dest. physical address in table  if not found, flood onto all attached LANs  if found, forward only out to specified LAN 4. forwarding table entriesdeleted if not refreshed (by 2) 4. forwarding table entriesdeleted if not refreshed (by 2)

24 Transparent Bridges: example Example: C sends packet to D; D replies with packet to C

25 C sends packet, bridge has no info about D; floods both LANs  bridge C on port 1  packet ignored on upper LAN  packet received by D D generates reply to C; sends  bridge sees packet from D  bridge notes that D is on part 2  bridge knows C on port 1; selectively forwards packet on part 1

26 Extended LAN with Loops Need to create spanning tree Distributed spanning tree algorithm  bridge with lowest id chosen as root  create minimum distance tree to root  similar to DVMRP approach  failure detection: root periodically sends messages down tree to other bridges