Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 15-441 Computer Networks Ethernet II Professor Hui Zhang

Similar presentations


Presentation on theme: "1 15-441 Computer Networks Ethernet II Professor Hui Zhang"— Presentation transcript:

1 1 15-441 Computer Networks Ethernet II Professor Hui Zhang hzhang@cs.cmu.edu

2 2 Hui Zhang Ethernet Frame Format  Preamble marks the beginning of the frame.  Also provides clock synchronization  Source and destination are 48 bit IEEE MAC addresses.  Flat address space  Hardwired into the network interface  Type field is a demultiplexing field.  What network layer (layer 3) should receive this packet?  Is actually a length field in the 802.3 standard  CRC for error checking. PreambleTypePadDestSourceDataCRC 86624

3 3 Hui Zhang Ethernet Packet Size  Why minimum size?  Why maximum size?

4 4 Hui Zhang Physical and Data Link  Medium  Unshielded Twisted Pair (UTP)  coaxial cable: baseband, broadband  fiber: multi-mode, single mode  radio, infrared  LAN technologies  Ethernet: CSMA-CD protocol  Fast Ethernet, Gigabit Ethernet  FDDI, Token Ring  ATM  WAN technologies  analog transmission: modem  digital transmission: T-1, T-3, Sonet, OC-3, OC-12  ATM, frame relay

5 5 Hui Zhang Wireless (802.11)  Designed for use in limited geographical area (i.e., couple of hundreds of meters)  Multiple physical mediums  Two based on spread spectrum radio  One based on diffused infrared

6 6 Hui Zhang Physical Link  Frequency hoping  Transmit the signal over multiple frequencies  The sequence of frequencies is pseudo-random, i.e., both sender and receiver use the same algorithm to generate their sequences  Direct sequence  Represent each bit by multiple (e.g., n) bits in a frame; XOR signal with a pseudo-random generated sequence with a frequency n times higher  Infrared signal  Sender and receiver do not need a clear line of sight  Limited range; order of meters

7 7 Hui Zhang Collision Avoidance: The Problems  Reachability is not transitive: if A can reach B, and B can reach C, it doesn’t necessary mean that A can reach C  Hidden nodes: A and C send a packet to B; neither A nor C will detect the collision!  Exposed node: B sends a packet to A; C hears this and decides not to send a packet to D (despite the fact that this will not cause interference)! ABC D

8 8 Hui Zhang Multiple Access with Collision Avoidance (MACA)  Before every data transmission  Sender sends a Request to Send (RTS) frame containing the length of the transmission  Receiver respond with a Clear to Send (CTS) frame  Sender sends data  Receiver sends an ACK; now another sender can send data  When sender doesn’t get a CTS back, it assumes collision senderreceiver other node in sender’s range RTS CTS ACK data

9 9 Hui Zhang Summary  Problem: arbitrate between multiple hosts sharing a common communication media  Wired solution: Ethernet (use CSMA/CD protocol)  Detect collisions  Backoff exponentially on collision  Wireless solution: 802.11  Use MACA protocol  Cannot detect collisions; try to avoid them  Distribution system & frame format in discussion sections

10 10 Hui Zhang Announcement  Hui’s office hour  Regular 3:00 -4:00 pm Tuesdays  Today alone: 3:45 pm – 4:30 pm  Where  7126 Wean Hall

11 11 Hui Zhang Internetworking  There are many different devices for interconnecting networks.

12 12 Hui Zhang Repeaters –Used to interconnect multiple Ethernet segments –Merely extends the baseband cable –Amplifies all signals including collisions

13 13 Hui Zhang Building Larger LANs: Bridges  Bridges connect multiple IEEE 802 LANs at layer 2.  Only forward packets to the right port  Reduce collision domain compared with single LAN  In contrast, hubs rebroadcast packets. host Bridge

14 14 Hui Zhang Address Lookup  Address is a 48 bit IEEE MAC address.  Next hop: output port for packet.  Timer is used to flush old entries  Size of the table is equal to the number of hosts. Bridge 8711C98900AA 2 AddressNext Hop A21032C9A591 1 99A323C90842 2 301B2369011C 2 695519001190 3 8:15 Info 8:36 8:01 8:16 8:11 1 3 2 A21032C9A591 695519001190 99A323C90842 8711C98900AA 301B2369011C

15 15 Hui Zhang Issues  How does a switch operate?  How to fill the forwarding tables?

16 16 Hui Zhang Switch Archicture: Generic  Input and output interfaces are connected through an interconnect  A interconnect can be implemented by  Shared memory –low capacity routers (e.g., PC-based routers)  Shared bus –Medium capacity routers  Point-to-point (switched) bus – High capacity routers input interfaceoutput interface Inter- connect

17 17 Hui Zhang Route Table CPU Buffer Memory Line Interface MAC Line Interface MAC Line Interface MAC Typically < 0.5Gbps aggregate capacity Limited by rate of shared memory Shared Backplane Line Interface CPU Memory Slide by Nick McKeown ArchitecturesArchitectures: First Generation

18 18 Hui Zhang Route Table CPU Line Card Buffer Memory Line Card MAC Buffer Memory Line Card MAC Buffer Memory Fwding Cache Fwding Cache Fwding Cache MAC Buffer Memory Typically < 5Gb/s aggregate capacity Limited by shared bus Slide by Nick McKeown ArchitecturesArchitectures: Second Generation

19 19 Hui Zhang Line Card MAC Local Buffer Memory CPU Card Line Card MAC Local Buffer Memory Switched Backplane Line Interface CPU Memory Fwding Table Routing Table Fwding Table Typically < 50Gbps aggregate capacity Slide by Nick McKeown ArchitecturesArchitectures: Third Generation

20 20 Hui Zhang Transparent Bridges   Overall design goal: Complete transparency – –“Plug-and-play” – –Self-configuring without hardware or software changes – –Bridges should not impact operation of existing LANs   Three parts to transparent bridges: (1) Forwarding of Frames (2) Learning of Addresses (3) Spanning Tree Algorithm

21 21 Hui Zhang Frame Forwarding  Each bridge maintains a forwarding database with entries MAC address: host name or group address port: port number of bridge age: aging time of entry with interpretation: –a machine with MAC address lies in direction of the port number from the bridge. The entry is age time units old.

22 22 Hui Zhang  Assume a MAC frame arrives on port x. Frame Forwarding 2 Search if MAC address of destination is listed for ports A, B, or C. Forward the frame on the appropriate port Flood the frame, i.e., send the frame on all ports except port x. Found? Not found ?

23 23 Hui Zhang  In principle, the forwarding database could be set statically (=static routing)  In the 802.1 bridge, the process is made automatic with a simple heuristic: The source field of a frame that arrives on a port tells which hosts are reachable from this port. Address Learning

24 24 Hui Zhang Algorithm:  For each frame received, the source stores the source field in the forwarding database together with the port where the frame was received.  All entries are deleted after some time (default is 15 seconds). Address Learning 2

25 25 Hui Zhang Example Consider the following packets:,, What have the bridges learned? XY

26 26 Hui Zhang  Consider the two LANs that are connected by two bridges.  Assume host n is transmitting a frame F with unknown destination. What is happening?  Bridges A and B flood the frame to LAN 2.  Bridge B sees F on LAN 2 (with unknown destination), and copies the frame back to LAN 1  Bridge A does the same.  The copying continues Where’s the problem? What’s the solution ? Danger of Loops

27 27 Hui Zhang  The solution to the loop problem is to not have loops in the topology  IEEE 802.1 has an algorithm that builds and maintains a spanning tree in a dynamic environment.  Bridges exchange messages to configure the bridge (Configuration Bridge Protocol Data Unit, Configuration BPDUs) to build the tree. Spanning Trees

28 28 Hui Zhang What do the BPDUs do? With the help of the BPDUs, bridges can:  Elect a single bridge as the root bridge.  Calculate the distance of the shortest path to the root bridge  Each LAN can determine a designated bridge, which is the bridge closest to the root. The designated bridge will forward packets towards the root bridge.  Each bridge can determine a root port, the port that gives the best path to the root.  Select ports to be included in the spanning tree.

29 29 Hui Zhang Configuration BPDUs

30 30 Hui Zhang Concepts  Each bridge as a unique identifier: Bridge ID = Note that a bridge has several MAC addresses (one for each port), but only one ID  Each port within a bridge has a unique identifier (port ID).  Root Bridge: The bridge with the lowest identifier is the root of the spanning tree.  Path Cost: Cost of the least cost path to the root from the port of a transmitting bridge; Assume it is measured in #Hops to the root.  Root Port:Each bridge has a root port which identifies the next hop from a bridge to the root.

31 31 Hui Zhang Concepts  Root Path Cost: For each bridge, the cost of the min-cost path to the root  Designated Bridge, Designated Port: Single bridge on a LAN that provides the minimal cost path to the root for this LAN: - if two bridges have the same cost, select the one with highest priority - if the min-cost bridge has two or more ports on the LAN, select the port with the lowest identifier  Note: We assume that “cost” of a path is the number of “hops”.

32 32 Hui Zhang Steps of Spanning Tree Algorithm 1. Determine the root bridge 2. Determine the root port on all other bridges 3. Determine the designated port on each LAN  Each bridge is sending out BPDUs that contain the following information: root bridge (what the sender thinks it is) root path cost for sending bridge Identifies sending bridge root ID cost bridge ID/port ID

33 33 Hui Zhang Ordering of Messages  We can order BPDU messages with the following ordering relation “  “: If (R1 < R2) M1 M2 elseif ((R1 == R2) and (C1 < C2)) M1  M2 elseif ((R1 == R2) and (C1 == C2) and (B1 < B2)) M1  M2 ID R1 C1 ID B1 ID R2 C2 ID B2  M1M2

34 34 Hui Zhang  Initially, all bridges assume they are the root bridge.  Each bridge B sends BPDUs of this form on its LANs:  Each bridge looks at the BPDUs received on all its ports and its own transmitted BPDUs.  Root bridge is the smallest received root ID that has been received so far (Whenever a smaller ID arrives, the root is updated) Determine the Root Bridge B B 0 0 B B

35 35 Hui Zhang  At this time: A bridge B has a belief of who the root is, say R.  Bridge B determines the Root Path Cost (Cost) as follows: –If B = R : Cost = 0. –If B  R: Cost = {Smallest Cost in any of BPDUs that were received from R} + 1  B’s root port is the port from which B received the lowest cost path to R (in terms of relation “  “).  Knowing R and Cost, B can generate its BPDU (but will not necessarily send it out): Calculate the Root Path Cost Determine the Root Port R R Cost B B

36 36 Hui Zhang  At this time: B has generated its BPDU  B will send this BPDU on one of its ports, say port x, only if its BPDU is lower (via relation “  “) than any BPDU that B received from port x.  In this case, B also assumes that it is the designated bridge for the LAN to which the port connects. Calculate the Root Path Cost Determine the Root Port R R Cost B B

37 37 Hui Zhang Selecting the Ports for the Spanning Tree  At this time: Bridge B has calculated the root, the root path cost, and the designated bridge for each LAN.  Now B can decide which ports are in the spanning tree: –B’s root port is part of the spanning tree –All ports for which B is the designated bridge are part of the spanning tree.  B’s ports that are in the spanning tree will forward packets (=forwarding state)  B’s ports that are not in the spanning tree will not forward packets (=blocking state)


Download ppt "1 15-441 Computer Networks Ethernet II Professor Hui Zhang"

Similar presentations


Ads by Google