Final Exam FTP Server Assignment10 Application Layer10 Transport10 Network10 Link-Layer10 Security10 Total60 Coverage and distribution of marks.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
5: DataLink Layer5-1 Mac Addressing, Ethernet, and Interconnections.
1 Ethernet EECS 489 Computer Networks Z. Morley Mao Wednesday Feb 21, 2007 Acknowledgement: Some slides taken.
1 Data Link Layer Ethernet Bridges Token Ring. 2 Summary of MAC protocols What do you do with a shared media? Channel Partitioning: time, frequency or.
5: DataLink Layer5a-1 MAC Sublayer. 5: DataLink Layer5a-2 Multiple Access Links and Protocols Two types of “links”: r point-to-point m PPP for dial-up.
1 Computer Networks Internetworking Devices. 2 Repeaters Hubs Bridges –Learning algorithms –Problem of closed loops Switches Routers.
5: DataLink Layer5-1 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram to destination IP subnet r MAC (or LAN or.
11/11/ /13/2003 DLL, Error Detection, MAC, ARP November 11-13, 2003.
1 Announcement r Homework #3 was due last night r Homework #4 is out.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
1 Last class r Random Access Protocols m Slotted Aloha m Aloha m CSMA/CD m “Taking Turns” Protocols r Link-Layer Addressing Today r Ethernet, Hubs and.
Review r Multicast Routing m Three options m source-based tree: one tree per source shortest path trees reverse path forwarding m group-shared tree: group.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
1 CSE401N: COMPUTER NetworkS LAN address & ARP Ethernet Basics.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
1 Interconnecting LAN segments Repeaters Hubs Bridges Switches.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
5: DataLink Layer5a-1 Summary of MAC protocols r What do you do with a shared media? m Channel Partitioning, by time, frequency or code Time Division,Code.
IP Address 0 network host 10 network host 110 networkhost 1110 multicast address A B C D class to to
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r LAN addresses and ARP r Ethernet Some slides are in courtesy of J.
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 26 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Mao W07 Multiple Access EECS 489 Computer Networks Z. Morley Mao Wednesday Feb 21, 2007 Acknowledgement:
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Lecture 17 Ethernet r Widely deployed because: m First LAN technology m Simpler and less expensive than token LANs and ATM m Kept up with the speed race:
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r multiple access protocols and LANs r link layer addressing, ARP r specific link layer.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
1 Week 5 Lecture 3 Data Link Layer. 2 Data Link Layer location application: supporting network applications –FTP, SMTP, STTP transport: host-host data.
5: DataLink Layer5-1 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire frame r If channel sensed.
Multiple Access Links and Protocols
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Data Link Layer. Useful References r Wireless Communications and Networks by William Stallings r Computer Networks (third edition) by Andrew Tanenbaum.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r link layer services r error detection, correction r multiple access protocols and LANs.
Ch 5. The Link Layer and Local Area Networks Myungchul Kim
Link Layer MAC Dr. Mozafar Bag-Mohammadi University of Ilam.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
4: DataLink Layer1 Hubs r Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
CSEN 404 Data Link Layer Amr El Mougy Lamia AlBadrawy.
4: DataLink Layer1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
CPSC 441: Link Layer1 Link Layer Addressing Slides originally from Carey Williamson Notes derived from “ Computer Networking: A Top Down Approach”, by.
5-1 Last time □ Multiple access protocols ♦ Channel partitioning MAC protocols TDMA, FDMA ♦ Random access MAC protocols Slotted Aloha, Pure Aloha, CSMA,
Chapter 5 Link Layer and LANs
MAC Addresses and ARP 32-bit IP address:
ARP: Address Resolution Protocol
CS 457 – Lecture 6 Ethernet Spring 2012.
Services of DLL Framing Link access Reliable delivery
Multiple access.
Mac Addressing, Ethernet, and Interconnections
Overview Jaringan Komputer (3)
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Dr. Mozafar Bag-Mohammadi University of Ilam
Link Layer 5.1 Introduction and services
Link Layer: Multiple Access
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Presentation transcript:

Final Exam FTP Server Assignment10 Application Layer10 Transport10 Network10 Link-Layer10 Security10 Total60 Coverage and distribution of marks

Note Wireless Networking is not going to be included in the Final Exam.

Types of Questions Define terms, identify technologies, explain purpose Explain concepts and protocols –Using diagrams (label them properly) –Appropriate variables (or parameters) Solve problems (e.g. apply DV Algorithm, CRC)

MAC Protocols: a taxonomy Three broad classes: Channel Partitioning Protocols –divide channel into smaller pieces (time slots, frequency bands, multiple access codes) –allocate piece to node for exclusive use Random Access Protocols –allow collisions –recover from collisions Taking turns Protocols –tightly coordinate shared access to avoid collisions Animation

Channel Partitioning (CDMA) CDMA (Code Division Multiple Access) Sender: sends encoded data bits simultaneously Receiver: assigned a unique code (i.e. code set partitioning) Has been used by military; now used mostly in wireless broadcast channels (cellular, satellite,etc) all users share same frequency, but each user has own ''chipping'' sequence (i.e., code) to encode data encoded signal = (original data) X (chipping sequence) decoding: inner-product of encoded signal and chipping sequence Advantage: allows multiple users to coexist and transmit simultaneously with minimal interference (if codes are orthogonal)

CDMA Encode/Decode M M mini slots are assigned to each data bit

CDMA: two-sender interference Assumption: interfering bit signals are additive

Random Access protocols When node has packet to send –transmit at full rate (R) of channel –no a priori coordination among nodes two or more transmitting nodes -> collision!!, random access MAC protocol specifies: –how to detect collisions –how to recover from collisions (e.g., via delayed retransmissions) Examples of random access MAC protocols: –slotted ALOHA –ALOHA –CSMA and CSMA/CD

CSMA: (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire pkt If channel sensed busy, defer transmission p –Persistent CSMA: retry immediately with probability p when channel becomes idle (may cause instability) –Non-persistent CSMA: retry after random time interval human analogy: don't interrupt others! RULES: Listen before speaking (carrier sensing) If someone else begins talking at the same time, stop talking (collision detection) Animation

CSMA collisions collisions can occur: propagation delay means two nodes may not yet hear each other's transmission collision: entire packet transmission time wasted spatial layout of nodes along ethernet note: role of distance and propagation delay in determining collision prob. Channel propagation delay 4 nodes attached to a linear broadcast bus; Horizontal axis shows position of each node in space D senses the channel is idle at t 1

CSMA/CD (Collision Detection) CSMA/CD: carrier sensing, deferral as in CSMA –collisions detected within short time –colliding transmissions aborted, reducing channel wastage –persistent or non-persistent retransmission collision detection: –easy in wired LANs: measure signal strengths, compare transmitted, received signals –difficult in wireless LANs: receiver shut off while transmitting human analogy: the polite conversation

CSMA/CD collision detection 4 nodes attached to a linear broadcast bus

From Network to Link-Layer Datagram to Frame

Recall earlier routing discussion A B E Starting at A, given IP datagram addressed to B:  look up net. address of B, find B on same net. as A  link layer send datagram to B inside link-layer frame B’s MAC addr A’s MAC addr A’s IP addr B’s IP addr IP payload datagram frame frame source, dest address datagram source, dest address Additional addresses!

ARP: Address Resolution Protocol Each IP node (Host, Router) on LAN has ARP module, table ARP Table: IP/MAC address mappings for some LAN nodes –TTL (Time To Live): time after which address mapping will be forgotten (typically 20 min) Question: how to determine MAC address of B given B's IP address? ARP for Ethernet (RFC 826), Intro to ARP,TCP/IP Tutorial (RFC 1180) Resides in RAM

ARP: Address Resolution Protocol How is ARP Table initialized? It’s plug-and-play! Not configured by Network Administrator Tables are automatically updated when one node is disconnected from subnet

ARP protocol: A Scenario A knows B's IP address, wants to learn physical address of B A broadcasts ARP query pkt, containing B's IP address –all machines on LAN receive ARP query B receives ARP packet, replies to A with its (B's) physical layer address A caches (saves) IP-to-physical address pairs until information becomes old (times out) –soft state: information that times out (goes away) unless refreshed Passes ARP packet within the frame up to its parent node Only one node (node with IP address=DEST IP in the ARP packet) sends back to the querying node a response ARP packet with the desired mapping In turn, the querying node can then update its ARP Table and send its IP datagram

Routing to another LAN A R B Network 1: Network address: /24 Network 2: Network address: /24 Two Types of Nodes: Hosts Routers Router has an IP address for each of its interfaces has an ARP module for each of its interfaces has an adapter for each of its interfaces each adapter has its own MAC Address 2 interfaces, 2 IP addresses, 2 ARP modules, 2 adapters (2 MAC addresses)

Routing to another LAN routing from A to B via R In routing table at source Host, find router In ARP table at source, find MAC address E6-E BB-4B, etc A R B Network 1: Network address: /24 Network 2: Network address: /24

A creates IP packet with source A, destination B A R B How a HOST on Subnet 1 sends a datagram to a HOST on Subnet 2? Passes datagram to adapter Host A must indicate to its adapter an appropriate MAC address (DEST) Note: Before sending the frame, MAC address must be acquired (should match one of the nodes in subnet; otherwise, will be lost). Then, frame is sent to Subnet.

A uses ARP to get R's physical layer address for (adapter side) A R B Note: Router interface handles routing; uses Forwarding Table Adapter uses ARP to find MAC address

(adapter) A creates Ethernet frame with R's physical address as dest, Ethernet frame contains A-to-B IP datagram (adapter) A's data link layer sends Ethernet frame (adapter) R's data link layer receives Ethernet frame –Passes frame to Network Layer (network layer) R removes IP datagram from Ethernet frame, sees its destined to B –Using router R’s Forwarding table) – table tells R to forward datagram via router interface R’s interface passes datagram to its adaptor A R B

(adapter) R uses ARP to get B's physical layer address (adapter) R creates frame containing A-to-B IP datagram sends to B A R B

CRC Pseudo code, Manual Calculation of CRC See sample computations sample

Ethernet: uses CSMA/CD A: sense channel, if idle then { transmit and monitor the channel; If another transmission is detected then { abort and send jam signal; update # collisions; delay as required by exponential backoff algorithm; goto A } else {done with the frame; set collisions to zero} } else {wait until ongoing transmission is over and goto A} Run without explicit coordination with other adapters on the Ethernet Connectionless unreliable service to Network Layer No signal energy in channel for 96 bit times

Ethernet’s CSMA/CD (more) Jam Signal: make sure all other transmitters are aware of collision; 48 bits; Exponential Backoff: Goal: adapt retransmission attempts to estimated current load –heavy load: random wait will be longer first collision: choose K randomly from {0, 2 m -1}; delay is K x 512 bit transmission times after second collision: choose K from {0,1,2,3}… after ten or more collisions, choose K from {0,1,2,3,4,…,1023} =min(10, num of collisions ) For 10Mbps Ethernet, time to transmit 1 bit = 0.1 microseconds

Network Devices Repeaters, Hubs, Bridges, Routers, Switches

Hubs Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces Hubs can be arranged in a hierarchy (or multi-tier design), with backbone hub at its top Definition of Terms

Backbone Bridge

Bridges Spanning Tree for increased reliability, it is desirable to have redundant, alternate paths from source to dest with multiple simultaneous paths, cycles result - bridges may multiply and forward frame forever solution: organize bridges in a spanning tree by disabling subset of interfaces Disabled

Bridge Learning: example Suppose C sends a frame to D and D replies back with a frame to C  C sends the frame to the bridge, but the bridge has no info. about D, so it floods both LANs  bridge notes that C is on port 1  frame ignored on upper LAN  frame received by D

Bridge Learning: example  D generates a reply to C, sends  bridge sees frame from D  bridge notes that D is on interface 2  bridge knows C on interface 1, so it selectively forwards the frame out via interface 1

Routers vs. Bridges Routers + and - + arbitrary topologies can be supported, cycling is limited by TTL counters (and good routing protocols) + provide firewall protection against broadcast storms - require IP address configuration (not plug and play) - require higher processing bandwidth bridges do well in small (few hundred hosts) while routers used in large networks (thousands of hosts)

Ethernet Switches (more) Dedicated Shared Institutional Network using a combination of hubs, Ethernet switches, router

Interconnection Devices COMPARISON OF FEATURES HUBSBRIDGESROUTERS ETHERNET SWITCHES Traffic Isolation NoYes Plug-and- Play Yes NoYes Optimal Routing No YesNo Cut- through YesNo Yes

Review Pseudo codes as well Let’s see some captured runs of the DV algorithm

Node Update 0123Min Min Rcv event, t=1.484 at 0; Source: 2, Dest: 0 Node 0 srtpkt2 0123Min = 73

Node Update Min Apply Poisoned ReverseNode 0 srtpkt0 0123Min turns 999 Send new mincost to neighbors via tolayer2()

DV Algorithm There are four routers connected via certain links (figure). Suppose that the following table is used for the initialisation of C’s routing table: C via ABD dest A1∞∞ B∞3∞ D∞∞2 And the minimum cost is an array of 4 integers in the order A, B, C, D: A advertises its minimum costs as: 0, 4, 1, ∞ B advertises its minimum costs as: 4, 0, 3, 1 D advertises its minimum costs as: ∞, 1, 2, 0 Show the first update on C’s table if C simultaneously receives packets with the minimum cost information from the routers A, B and D

The End. Good luck!