1 15-441 Computer Networks Ethernet II Professor Hui Zhang

Slides:



Advertisements
Similar presentations
Communication Networks Recitation 3 Bridges & Spanning trees.
Advertisements

University of Calgary – CPSC 441.  We need to break down big networks to sub-LANs  Limited amount of supportable traffic: on single LAN, all stations.
Topic 7 Local Area Networks (LAN)
CS 356: Computer Network Architectures Lecture 8: Learning Bridges and ATM Ch 3.1 Xiaowei Yang
Computer Networks Ethernet I Professor Hui Zhang
CSCI 465 D ata Communications and Networks Lecture 20 Martin van Bommel CSCI 465 Data Communications & Networks 1.
CSE 534 Fundamentals of Computer Networks Lecture 4: Bridging (From Hub to Switch by Way of Tree) Based on slides from D. Choffnes Northeastern U. Revised.
CS 4700 / CS 5700 Network Fundamentals Lecture 7: Bridging (From Hub to Switch by Way of Tree) Revised 1/14/13.
CPSC 441 TUTORIAL TA: FANG WANG HUBS, SWITCHES AND BRIDGES Parts of the slides contents are courtesy of the following people: Jim Kurose, Keith Ross:
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
1 Computer Networks Internetworking Devices. 2 Repeaters Hubs Bridges –Learning algorithms –Problem of closed loops Switches Routers.
COMS/CSEE 4140 Networking Laboratory Lecture 07 Salman Abdul Baset Spring 2008.
CSEE W4140 Networking Laboratory Lecture 8: LAN Switching Jong Yul Kim
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
W4140 Network Laboratory Lecture 7 Oct 23 - Fall 2006 Shlomo Hershkop Columbia University.
Spanning Tree and Wireless EE122 Discussion 10/28/2011.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
CSE390 Advanced Computer Networks Lecture 7: Bridging (From Hub to Switch by Way of Tree) Based on slides from D. Choffnes Northeastern U. Revised Fall.
Introduction to Computer Networks 09/23 Presenter: Fatemah Panahi.
COMS W COMS W Lecture 7. LAN Switching: Bridges & Spanning Tree Protocol.
LAN switching and Bridges
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
COMPUTER NETWORKS.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
1 Computer Networks LAN Bridges and Switches. 2 Where are we?
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Connecting LANs, Backbone Networks, and Virtual LANs
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 8: Bridging Slides used with permissions.
LAN Overview (part 2) CSE 3213 Fall April 2017.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
1 LAN switching and Bridges. 2 Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent bridges.
1 CS 4396 Computer Networks Lab LAN Switching and Bridges.
1 LAN switching and Bridges CS491G: Computer Networking Lab V. Arun Slides adapted from Liebeherr and El Zarki, and Kurose and Ross.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Module 8: Ethernet Switching
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
Ethernet (LAN switching)
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Scaling Broadcast Ethernet Some slides used with.
1 Data Link Layer Lecture 23 Imran Ahmed University of Management & Technology.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Copyright 2002Cisco Press: CCNA Instructor’s Manual Year 2 - Chapter 16/Cisco 4 - Module 9 CCNA Certification Exam Review By Your Name.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
M. Veeraraghavan (originals by J. Liebeherr) 1 Need for Routing in Ethernet switched networks What do bridges do if some LANs are reachable only in multiple.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
M. Veeraraghavan (originals by J. Liebeherr) 1 Internetworking Bridges Routing with Bridges * * Reading material is EL 536 textbook (sections 14.1 and.
5: DataLink Layer 5a-1 Bridges and spanning tree protocol Reference: Mainly Peterson-Davie.
Ch. 15 Connecting LANs.
1 Chapter 3: Packet Switching (Switched LANs) Dr. Rocky K. C. Chang 23 February 2004.
Computer Communication and Networking Lecture # 4 by Zainab Malik 1.
Peter A. Steenkiste, SCS, CMU 1 Lecture 7 Datalink – Bridging and Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer.
1 LAN switching and Bridges Relates to Lab Outline Interconnection devices Bridges/LAN switches vs. Routers Bridges Learning Bridges Transparent.
1 LAN switching and Bridges Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging)
Ethernet switches and IP routers
Bridging.
3. Internetworking (part 2: switched LANs)
LAN switching and Bridges
CS 4700 / CS 5700 Network Fundamentals
LAN switching and Bridges
Chapter 6 The Link Layer and LANs
LAN switching and Bridges
CS 4700 / CS 5700 Network Fundamentals
Dr. Rocky K. C. Chang 23 February 2004
LAN switching and Bridges
Presentation transcript:

Computer Networks Ethernet II Professor Hui Zhang

2 Hui Zhang Ethernet Frame Format  Preamble marks the beginning of the frame.  Also provides clock synchronization  Source and destination are 48 bit IEEE MAC addresses.  Flat address space  Hardwired into the network interface  Type field is a demultiplexing field.  What network layer (layer 3) should receive this packet?  Is actually a length field in the standard  CRC for error checking. PreambleTypePadDestSourceDataCRC 86624

3 Hui Zhang Ethernet Packet Size  Why minimum size?  Why maximum size?

4 Hui Zhang Physical and Data Link  Medium  Unshielded Twisted Pair (UTP)  coaxial cable: baseband, broadband  fiber: multi-mode, single mode  radio, infrared  LAN technologies  Ethernet: CSMA-CD protocol  Fast Ethernet, Gigabit Ethernet  FDDI, Token Ring  ATM  WAN technologies  analog transmission: modem  digital transmission: T-1, T-3, Sonet, OC-3, OC-12  ATM, frame relay

5 Hui Zhang Wireless (802.11)  Designed for use in limited geographical area (i.e., couple of hundreds of meters)  Multiple physical mediums  Two based on spread spectrum radio  One based on diffused infrared

6 Hui Zhang Physical Link  Frequency hoping  Transmit the signal over multiple frequencies  The sequence of frequencies is pseudo-random, i.e., both sender and receiver use the same algorithm to generate their sequences  Direct sequence  Represent each bit by multiple (e.g., n) bits in a frame; XOR signal with a pseudo-random generated sequence with a frequency n times higher  Infrared signal  Sender and receiver do not need a clear line of sight  Limited range; order of meters

7 Hui Zhang Collision Avoidance: The Problems  Reachability is not transitive: if A can reach B, and B can reach C, it doesn’t necessary mean that A can reach C  Hidden nodes: A and C send a packet to B; neither A nor C will detect the collision!  Exposed node: B sends a packet to A; C hears this and decides not to send a packet to D (despite the fact that this will not cause interference)! ABC D

8 Hui Zhang Multiple Access with Collision Avoidance (MACA)  Before every data transmission  Sender sends a Request to Send (RTS) frame containing the length of the transmission  Receiver respond with a Clear to Send (CTS) frame  Sender sends data  Receiver sends an ACK; now another sender can send data  When sender doesn’t get a CTS back, it assumes collision senderreceiver other node in sender’s range RTS CTS ACK data

9 Hui Zhang Summary  Problem: arbitrate between multiple hosts sharing a common communication media  Wired solution: Ethernet (use CSMA/CD protocol)  Detect collisions  Backoff exponentially on collision  Wireless solution:  Use MACA protocol  Cannot detect collisions; try to avoid them  Distribution system & frame format in discussion sections

10 Hui Zhang Announcement  Hui’s office hour  Regular 3:00 -4:00 pm Tuesdays  Today alone: 3:45 pm – 4:30 pm  Where  7126 Wean Hall

11 Hui Zhang Internetworking  There are many different devices for interconnecting networks.

12 Hui Zhang Repeaters –Used to interconnect multiple Ethernet segments –Merely extends the baseband cable –Amplifies all signals including collisions

13 Hui Zhang Building Larger LANs: Bridges  Bridges connect multiple IEEE 802 LANs at layer 2.  Only forward packets to the right port  Reduce collision domain compared with single LAN  In contrast, hubs rebroadcast packets. host Bridge

14 Hui Zhang Address Lookup  Address is a 48 bit IEEE MAC address.  Next hop: output port for packet.  Timer is used to flush old entries  Size of the table is equal to the number of hosts. Bridge 8711C98900AA 2 AddressNext Hop A21032C9A A323C B C :15 Info 8:36 8:01 8:16 8: A21032C9A A323C C98900AA 301B C

15 Hui Zhang Issues  How does a switch operate?  How to fill the forwarding tables?

16 Hui Zhang Switch Archicture: Generic  Input and output interfaces are connected through an interconnect  A interconnect can be implemented by  Shared memory –low capacity routers (e.g., PC-based routers)  Shared bus –Medium capacity routers  Point-to-point (switched) bus – High capacity routers input interfaceoutput interface Inter- connect

17 Hui Zhang Route Table CPU Buffer Memory Line Interface MAC Line Interface MAC Line Interface MAC Typically < 0.5Gbps aggregate capacity Limited by rate of shared memory Shared Backplane Line Interface CPU Memory Slide by Nick McKeown ArchitecturesArchitectures: First Generation

18 Hui Zhang Route Table CPU Line Card Buffer Memory Line Card MAC Buffer Memory Line Card MAC Buffer Memory Fwding Cache Fwding Cache Fwding Cache MAC Buffer Memory Typically < 5Gb/s aggregate capacity Limited by shared bus Slide by Nick McKeown ArchitecturesArchitectures: Second Generation

19 Hui Zhang Line Card MAC Local Buffer Memory CPU Card Line Card MAC Local Buffer Memory Switched Backplane Line Interface CPU Memory Fwding Table Routing Table Fwding Table Typically < 50Gbps aggregate capacity Slide by Nick McKeown ArchitecturesArchitectures: Third Generation

20 Hui Zhang Transparent Bridges   Overall design goal: Complete transparency – –“Plug-and-play” – –Self-configuring without hardware or software changes – –Bridges should not impact operation of existing LANs   Three parts to transparent bridges: (1) Forwarding of Frames (2) Learning of Addresses (3) Spanning Tree Algorithm

21 Hui Zhang Frame Forwarding  Each bridge maintains a forwarding database with entries MAC address: host name or group address port: port number of bridge age: aging time of entry with interpretation: –a machine with MAC address lies in direction of the port number from the bridge. The entry is age time units old.

22 Hui Zhang  Assume a MAC frame arrives on port x. Frame Forwarding 2 Search if MAC address of destination is listed for ports A, B, or C. Forward the frame on the appropriate port Flood the frame, i.e., send the frame on all ports except port x. Found? Not found ?

23 Hui Zhang  In principle, the forwarding database could be set statically (=static routing)  In the bridge, the process is made automatic with a simple heuristic: The source field of a frame that arrives on a port tells which hosts are reachable from this port. Address Learning

24 Hui Zhang Algorithm:  For each frame received, the source stores the source field in the forwarding database together with the port where the frame was received.  All entries are deleted after some time (default is 15 seconds). Address Learning 2

25 Hui Zhang Example Consider the following packets:,, What have the bridges learned? XY

26 Hui Zhang  Consider the two LANs that are connected by two bridges.  Assume host n is transmitting a frame F with unknown destination. What is happening?  Bridges A and B flood the frame to LAN 2.  Bridge B sees F on LAN 2 (with unknown destination), and copies the frame back to LAN 1  Bridge A does the same.  The copying continues Where’s the problem? What’s the solution ? Danger of Loops

27 Hui Zhang  The solution to the loop problem is to not have loops in the topology  IEEE has an algorithm that builds and maintains a spanning tree in a dynamic environment.  Bridges exchange messages to configure the bridge (Configuration Bridge Protocol Data Unit, Configuration BPDUs) to build the tree. Spanning Trees

28 Hui Zhang What do the BPDUs do? With the help of the BPDUs, bridges can:  Elect a single bridge as the root bridge.  Calculate the distance of the shortest path to the root bridge  Each LAN can determine a designated bridge, which is the bridge closest to the root. The designated bridge will forward packets towards the root bridge.  Each bridge can determine a root port, the port that gives the best path to the root.  Select ports to be included in the spanning tree.

29 Hui Zhang Configuration BPDUs

30 Hui Zhang Concepts  Each bridge as a unique identifier: Bridge ID = Note that a bridge has several MAC addresses (one for each port), but only one ID  Each port within a bridge has a unique identifier (port ID).  Root Bridge: The bridge with the lowest identifier is the root of the spanning tree.  Path Cost: Cost of the least cost path to the root from the port of a transmitting bridge; Assume it is measured in #Hops to the root.  Root Port:Each bridge has a root port which identifies the next hop from a bridge to the root.

31 Hui Zhang Concepts  Root Path Cost: For each bridge, the cost of the min-cost path to the root  Designated Bridge, Designated Port: Single bridge on a LAN that provides the minimal cost path to the root for this LAN: - if two bridges have the same cost, select the one with highest priority - if the min-cost bridge has two or more ports on the LAN, select the port with the lowest identifier  Note: We assume that “cost” of a path is the number of “hops”.

32 Hui Zhang Steps of Spanning Tree Algorithm 1. Determine the root bridge 2. Determine the root port on all other bridges 3. Determine the designated port on each LAN  Each bridge is sending out BPDUs that contain the following information: root bridge (what the sender thinks it is) root path cost for sending bridge Identifies sending bridge root ID cost bridge ID/port ID

33 Hui Zhang Ordering of Messages  We can order BPDU messages with the following ordering relation “  “: If (R1 < R2) M1 M2 elseif ((R1 == R2) and (C1 < C2)) M1  M2 elseif ((R1 == R2) and (C1 == C2) and (B1 < B2)) M1  M2 ID R1 C1 ID B1 ID R2 C2 ID B2  M1M2

34 Hui Zhang  Initially, all bridges assume they are the root bridge.  Each bridge B sends BPDUs of this form on its LANs:  Each bridge looks at the BPDUs received on all its ports and its own transmitted BPDUs.  Root bridge is the smallest received root ID that has been received so far (Whenever a smaller ID arrives, the root is updated) Determine the Root Bridge B B 0 0 B B

35 Hui Zhang  At this time: A bridge B has a belief of who the root is, say R.  Bridge B determines the Root Path Cost (Cost) as follows: –If B = R : Cost = 0. –If B  R: Cost = {Smallest Cost in any of BPDUs that were received from R} + 1  B’s root port is the port from which B received the lowest cost path to R (in terms of relation “  “).  Knowing R and Cost, B can generate its BPDU (but will not necessarily send it out): Calculate the Root Path Cost Determine the Root Port R R Cost B B

36 Hui Zhang  At this time: B has generated its BPDU  B will send this BPDU on one of its ports, say port x, only if its BPDU is lower (via relation “  “) than any BPDU that B received from port x.  In this case, B also assumes that it is the designated bridge for the LAN to which the port connects. Calculate the Root Path Cost Determine the Root Port R R Cost B B

37 Hui Zhang Selecting the Ports for the Spanning Tree  At this time: Bridge B has calculated the root, the root path cost, and the designated bridge for each LAN.  Now B can decide which ports are in the spanning tree: –B’s root port is part of the spanning tree –All ports for which B is the designated bridge are part of the spanning tree.  B’s ports that are in the spanning tree will forward packets (=forwarding state)  B’s ports that are not in the spanning tree will not forward packets (=blocking state)