Spring 2010CS 3321 Chapter 2 Tidbits Outline A little hardware Ethernet Reading: Sec. 2.1, 2.2, 2.6.

Slides:



Advertisements
Similar presentations
Ethernet. Most successful local area networking technology of last 20 years. Developed in the mid-1970s by researchers at the Xerox Palo Alto Research.
Advertisements

CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Topic 7 Local Area Networks (LAN)
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
© 2002 JW Ryder CS 428 Computer Networks 1 Ethernet Properties 10Mbps/100Mbps broadcast bus technology –Bus: all stations share single channel –Broadcast:
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
CSC 450/550 Part 3: The Medium Access Control Sublayer.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 4 – Ethernet frame.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Review on Networking Technologies Linda Wu (CMPT )
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
Thin Ethernet (10B2 / IEEE 802.3a) Segment length 0.5 m Up to 30 attached nodes Cable flexible and cheap Integrated or external transceiver connected via.
Spring 2006CS 3321 Chapter 2 Tidbits Outline A little hardware Ethernet Realistic data transfer rates.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
Ethernet, MAC podvrstva
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Internetworking An internetwork is typically comprised of many physical networks over which data travels There are many different types of physical networks:
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
1Ethernet Lecture # 12 Computer Communication & Networks.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
Lecture Topics: 11/27 Networks Layered Model Ethernet IP.
Ethernet Overview it the IEEE standard for Ethernet.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Lec # 23 Data communucation Muhammad Waseem Iqbal 1ethernet.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
CS380 Int. to Comp. Networks Data Link Networks - Part II1 Reliable Transmission How to fix corrupted frames. –Error correcting codes too expensive –Should.
The University of Adelaide, School of Computer Science
Advanced Computer Networks
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
CS 457 – Lecture 6 Ethernet Spring 2012.
Chapter 12 Local Area Networks
Getting Connected (Chapter 2 Part 3)
Ethernet Neil Tang 9/17/2008 CS440 Computer Networks.
Outline A little hardware Ethernet Realistic data transfer rates
Protocol layering and data
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Ethernet 16EC351 Computer networks unit II Mr.M.Jagadesh,AP/ECE.
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Presentation transcript:

Spring 2010CS 3321 Chapter 2 Tidbits Outline A little hardware Ethernet Reading: Sec. 2.1, 2.2, 2.6

Spring 2010CS 3322 Why? Host architecture affects “realistic” data transfer rates, which affects protocol design It’s a good idea to see a bit of the details of how at least one kind of LAN works –Ethernet is popular (though being replaced by faster technologies) –It uses a media access control (MAC) protocol that gives a good introduction to some of the problems encountered in MAC design

Spring 2010CS 3323 Example Workstation Architecture

Spring 2010CS 3324 Key Features Memory is finite (say 1GB – 8 GB) –Memory (along with bandwidth) are two key scarce network resources that must be carefully managed –Scarce because on a switch or router, packets must be buffered in memory while awaiting transmission over link Each node connects to network via a network adaptor (card, interface) –Sits on system I/O bus and transfers data between memory and network link –Device driver (OS component) on workstation manages the adaptor (i.e., where (memory address) should incoming data be stored, what commands are sent to adaptor and when) While CPU speeds are doubling every 18 months, same is not true of memory speeds (only approx. 7% increase per year) –It is the speed of memory access, not how fast the processor is, that limits how fast we can transfer data on the network!

Spring 2010CS 3325 Interfacing to the wire Transceiver functions –Signal detection –Collision detection –Jam signaling Controller functions –Transmit and receive packets –Frame construction –Address recognition –Packet buffering –Checksum generation & verification –DMA interaction with memory

Spring 2010CS 3326 The Memory Bottleneck Memory Bandwidth on a modern PC-class machine I/O bus 3200 Mbps8512 Mbps CPU Memory Crossbar

Spring 2010CS 3327 The Memory Bottleneck Looks like we should be able to transmit frames between network adaptor and host memory at rate of 8512 Mbps –Misleading: the figure measures peak bandwidth! (64 bit wide 133 MHz = 8512 Mbps) – ignores overhead –Limitation is size of data blocks being transferred across bus –Ex. Takes 8 clock cycles to acquire bus, regardless of number of bytes transferred (bus arbitration), so 64 byte payload takes 16 cycles (bus is 64 bits wide so 8 cycles for data + 8 for bus acquisition) so max bandwidth is Mbps

Spring 2010CS 3328 But There’s More… Memory/CPU bandwidth (3200 Mbps) is realistic, but same order of magnitude as range of network bandwidths machine can support. So yes, there is a network-speed path to CPU registers… We may need to "touch" each word of data in a network packet multiple times to process it (possibly because it needs to be copied from one buffer to another). –If memory/CPU path crossed n times, then effective throughput is 3200 Mbps/n. –Ex. If copying needs to be done 5 times (not uncommon), then your peak bandwidth is now 640 Mbps. Fixing involves protocol stack architecture, understanding cache/memory interaction, etc.

Spring 2010CS 3329 LANs and the OSI RM Primary Data Link Layer Tasks –Data Framing –Error Detection –Acknowledgments –Retransmissions –Duplicate detection Typical LANs need only address Data Link layer issues of providing communication between two computers which are “directly connected.”

Spring 2010CS LANs and the OSI RM Primary Media Access Sublayer Tasks –Arbitrating access to shared medium –Error detection Because most LANs use broadcast media, the Data Link layer is divided between the “Logical Link Control” sublayer (for “point-to-point” Data Link layer functionality) and the “Media Access” sublayer, which disguises the broadcast service provided by the physical layer as a set of point to point links.

Spring 2010CS Ethernet (IEEE 802.3) Multiple access network –Nodes send and receive frames over a shared link Carrier Sense Multiple Access with Collision Detect (CSMA/CD) –CSMA: all nodes can distinguish between an idle and busy link –CD: nodes listen as they transmit and can therefore detect when frame it is transmitting has interfered with a frame transmitted by another node Evolved philosophically from the Aloha packet radio network (both mediate access to a shared medium—for Aloha it was the atmosphere, for Ethernet a coaxial cable). Section 2.6 in text!

Spring 2010CS Ethernet (802.3) DEC, Intel, Zerox joined forces to define 10Mbps Ethernet standard in –100Mbps and 1Gps Ethernet are designed for point-to- point switched network, so not the “true” ethernet algorithm. IEEE Standard is the “official” protocol, though not every Ethernet follows this standard (slight differences in certain packet header fields, etc).

Spring 2010CS Physical Properties Implemented on coaxial cable of up to 500 meters in length Hosts connect by “tapping” into it. –Taps at least 2.5 meters apart Transceiver is small device directly attached to tap –Detects when line is idle and drives signal when host is transmitting All protocol logic implemented in the adaptor (not transceiver)

Spring 2010CS Multiple Ethernet Segments Multiple Ethernet segments can be joined together by repeaters –No more than four repeaters between any two hosts (so Ethernet has a total reach of only 2500 meters). –Like single Ethernet, each host hears every message sent on network An Ethernet is limited, regardless of whether repeaters used, to 1024 hosts Again, any signal is heard by everyone –Terminators attached to end of each segment absorb signal and keep if from reflecting back and interfering with trailing signals

Spring 2010CS All hosts in the same collision domain

Spring 2010CS Frame Format 64 bit preamble for synchronization (unseen by host) 48 bit address fields for both destination and source Type field (to which higher level protocol should this frame be delivered)

Spring 2010CS Frame Format (cont.) Body: minimum of 46 and maximum of 1500 bytes of data –Minimum required to keep frames long enough for collision detection 32 bit CRC (cyclic redundancy check) for error checking format slightly different (16 bit length field replaces the type field) –Software kludged so that it can handle either

Spring 2010CS Addresses Typically written in hex notation –Ex. 8:0:2b:e4:b1:2 Every Ethernet Adaptor in world has unique Ethernet address –Burned into ROM at factory –Each manufacturer has different prefix Ex. AMD starts with x Each frame transmitted on Ethernet received by every adaptor on that Ethernet

Spring 2010CS Adaptor Accepts: Frames addressed to its own address Frames addressed to the broadcast address (all 1s) Frames addressed to a multicast address (first bit 1) if instructed to listen for that address by host All frames, if it is in promiscuous mode Note that every adaptor receives enough of every frame to do address recognition It passes to host only the frames that it accepts

Spring 2010CS Transmitter Algorithm When adaptor has frame to send and line is idle, it transmits frame immediately –Upper bound of 1500 bytes ensures that no adaptor can occupy the line for too long If adaptor has frame to send and line is busy, it waits for line to go idle then transmits immediately –Well, all adaptors wait 9.6 μ sec after one frame before sending next

Spring 2010CS Transmitter Algorithm (cont.) It is possible for two or more adaptors to begin transmitting at same time (a collision) If collision occurs, both adaptors transmit a 32 bit jamming sequence, then stop transmitting. –So in minimal case an adaptor sends 96 bits: 64 bit preamble and 32 bit jamming sequence (this is called a runt frame) –Runt frame only occurs if senders are near. In worst case they may need to send as many as 512 bits (64) bytes past preamble to detect collision (thus the 46 data byte miminum: 14 bytes of header plus 46 bytes of data plus 4 byte CRC = 64 bytes). –Why 512 bits?!

Spring 2010CS Bits… A sends frame at time t A’s frame arrives at B at time t+d B begins transmitting at time t+d and collides with A’s frame Host A must transmit for 2d to be sure it detects all possible collisions! B’s runt (32 bits) arrives at A at time t +2d Worst case scenario:

Spring 2010CS Bits (cont.) A maximally configured Ethernet is 2500 meters long Has max of 4 repeaters Round trip delay has been determined to be 51.2 μ s long, which on 10Mbps Ethernet is 512 bits Bottom line: limits placed on Ethernet are designed to limit latency on the network, and thus allow the access algorithm to work somewhat efficiently

And after the Collision? Min. pkt. length insures all colliding hosts detect the collision How do we decide when to try again? –Remember, a station has no information about what other stations are involved or where they are located. Spring 2010CS 33224

Binary Exponential Backoff Algorithm After first collision, randomly choose to retransmit after 0 or 1 slot times. If another collision, double the retransmission interval to four possible slots, and pick one at random. Repeat until: –Success – you're done; or –16 tries and no success. Quit and declare network broken. (Interval only increases first 10 times.) Spring 2010CS 33225

BEB Notes Good because it requires no global (in the sense of knowing what's going on at other stations) state info. Completely distributed. Introduces a probabilistic element into the performance of the protocol We can't make hard guarantees about delay. (Token ring was better about this.) Spring 2010CS 33226

Spring 2010CS Ethernet Success Extremely easy to administer and maintain –No switches that can fail –No routing or configuration tables to maintain –Easy to add new hosts Inexpensive –Cable is cheap –Only additional cost is network adapter for each host (potentially as little as $5 per host these days)