44
1 SC250 Computer Networking I Link Layer (2) http://lcawww.epfl.ch Prof. Matthias Grossglauser LCA/I&C

Link layer (2)

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Link layer (2)

1

SC250Computer Networking I

Link Layer (2)

http://lcawww.epfl.ch

Prof. Matthias Grossglauser

LCA/I&C

Page 2: Link layer (2)

2

Objectives

Understand key LAN technologies: Ethernet Wireless LAN: WiFi = IEEE 802.11

Conclusion and outlook

Page 3: Link layer (2)

3

Ethernet

Dominant LAN technology: cheap first widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed race: 10, 100, 1000 Mbps

Metcal fe’s Eth ern etsketch

Page 4: Link layer (2)

4

Ethernet Frame Structure

Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame

Preamble: 7 bytes with pattern 10101010 followed by one

byte with pattern 10101011 used to synchronize receiver, sender clock

rates

Page 5: Link layer (2)

5

Ethernet Frame Structure

Addresses: 6 bytes if adapter receives frame with matching destination

address, or with broadcast address (eg ARP packet), it passes data in frame to net-layer protocol

otherwise, adapter discards frame Type: indicates the higher layer protocol, mostly IP

but others may be supported such as Novell IPX and AppleTalk)

CRC: checked at receiver, if error is detected, the frame is simply dropped

Page 6: Link layer (2)

6

Unreliable, Connectionless Service

Connectionless: No handshaking between sending and receiving adapter.

Unreliable: receiving adapter doesn’t send acks or nacks to sending adapter stream of datagrams passed to network layer can have

gaps gaps will be filled if app is using TCP otherwise, app will see the gaps

Page 7: Link layer (2)

7

Ethernet uses CSMA/CD

No slots Adapter doesn’t

transmit if it senses that some other adapter is transmitting, that is, carrier sense

Transmitting adapter aborts when it senses that another adapter is transmitting, that is, collision detection

Before attempting a retransmission, adapter waits a random time, that is, random access

Page 8: Link layer (2)

8

Ethernet CSMA/CD Algorithm

1. Adaptor gets datagram from and creates frame

2. If adapter senses channel idle, it starts to transmit frame. If it senses channel busy, waits until channel idle and then transmits

3. If adapter transmits entire frame without detecting another transmission, the adapter is done with frame !

4. If adapter detects another transmission while transmitting, aborts and sends jam signal

5. After aborting, adapter enters exponential backoff: after the mth collision, adapter chooses a K at random from {0,1,2,…,2m-1}. Adapter waits K*512 bit times and returns to Step 2

Page 9: Link layer (2)

9

Ethernet’s CSMA/CD

Jam Signal: make sure all other transmitters are aware of collision; 48 bits;

Bit time: .1 microsec for 10 Mbps Ethernet ;for K=1023, wait time is about 50 msec

Exponential Backoff: Goal: adapt

retransmission attempts to estimated current load

heavy load: random wait will be longer

first collision: choose K from {0,1}; delay is K x 512 bit transmission times

after second collision: choose K from {0,1,2,3}…

after ten collisions, choose K from {0,1,2,3,4,…,1023}

Check the Java applet on Addison - WesleyWeb site

Page 10: Link layer (2)

10

CSMA/CD Efficiency

tprop = max prop between 2 nodes in LAN

ttrans = time to transmit max-size frame

Efficiency goes to 1 as tprop goes to 0

Goes to 1 as ttrans goes to infinity

Much better than ALOHA, but still decentralized, simple, and cheap

transprop tt /51

1efficiency

+=

Page 11: Link layer (2)

11

Ethernet Technologies: 10Base2 10: 10Mbps; 2: under 200 meters max cable length Thin coaxial cable in a bus topology

Repeaters used to connect up to multiple segments Repeater repeats bits it hears on one interface to its

other interfaces: physical layer device only! Has become a legacy technology

Page 12: Link layer (2)

12

10BaseT and 100BaseT 10/100 Mbps rate; latter called “fast ethernet” T stands for Twisted Pair Nodes connect to a hub: “star topology”; 100 m

max distance between nodes and hub

Hubs are essentially physical-layer repeaters: bits coming in one link go out all other links no frame buffering no CSMA/CD at hub: adapters detect collisions provides net management functionality

h ub

n odes

Page 13: Link layer (2)

13

Gbit Ethernet (“GigE”)

Use standard Ethernet frame format Allows for point-to-point links and shared

broadcast channels In shared mode, CSMA/CD is used; short

distances between nodes to be efficient Uses hubs, called here “Buffered Distributors” Full-Duplex at 1 Gbps for point-to-point links 10 Gbps now !

Page 14: Link layer (2)

14

Link Layer (2)

Hubs, Bridges, and

Switches

Page 15: Link layer (2)

15

Interconnecting with Hubs

Backbone hub interconnects LAN segments Extends max distance between nodes But individual segment collision domains become

one large collision domain if a node in CS and a node EE transmit at same time:

collision Can’t interconnect 10BaseT & 100BaseT

Page 16: Link layer (2)

16

Bridges

Link layer device stores and forwards Ethernet frames examines frame header and selectively forwards frame

based on MAC dest address when frame is to be forwarded on segment, uses

CSMA/CD to access segment Transparent

hosts are unaware of presence of bridges Plug-and-play, self-learning

bridges do not need to be configured

Page 17: Link layer (2)

17

Bridges: Traffic Isolation

Bridge installation breaks LAN into LAN segments

bridges filter packets: same-LAN-segment frames not usually forwarded onto

other LAN segments segments become separate collision domains

br idge col l is ion dom ain

col l is ion dom ain

= h ub

= h ost

LAN (IP n etw ork)

LAN segmen t LAN segm en t

Page 18: Link layer (2)

18

Forwarding

How do determine to wh ich LAN segmen t to forward f rame?• Looks like a rout ing problem...

Page 19: Link layer (2)

19

Self-Learning

A bridge has a bridge table Entry in bridge table:

(Node LAN Address, Bridge Interface, Time Stamp) stale entries in table dropped (TTL can be 60 min)

Bridges learn which hosts can be reached through which interfaces when frame received, bridge “learns” location of sender:

incoming LAN segment records sender/location pair in bridge table

Page 20: Link layer (2)

20

Filtering/Forwarding

When bridge receives a frame:

index bridge table using MAC dest address

if entry found for destinationthen{

if dest on segment from which frame arrived then drop the frame

else forward the frame on interface indicated

}

else flood

forward on all but the in ter face on wh ich the f rame arr ived

Page 21: Link layer (2)

21

Bridge Example

Suppose C sends frame to D and D replies back with frame to C

Bridge receives frame from from C notes in bridge table that C is on interface 1 because D is not in table, bridge sends frame into

interfaces 2 and 3

Frame received by D

Page 22: Link layer (2)

22

Bridge Learning: Example

D generates frame for C, sends Bridge receives frame

notes in bridge table that D is on interface 2 bridge knows C is on interface 1, so selectively

forwards frame to interface 1

Page 23: Link layer (2)

23

Bridges Spanning Tree

For increased reliability, desirable to have redundant, alternative paths from source to dest

With multiple paths, cycles result - bridges may multiply and forward frame forever

Solution: organize bridges in a spanning tree by disabling subset of interfaces

Disabled

Page 24: Link layer (2)

24

Some Bridge Features

Isolates collision domains resulting in higher total max throughput

Limitless number of nodes and geographical coverage

Can connect different Ethernet types Transparent (“plug-and-play”): no

configuration necessary

Page 25: Link layer (2)

25

Bridges vs. Routers Both store-and-forward devices

routers: network layer devices (examine network layer headers)

bridges are link layer devices

Routers maintain routing tables, implement routing algorithms

Bridges maintain bridge tables, implement filtering, learning and spanning tree algorithms

Page 26: Link layer (2)

26

Routers vs. Bridges

Bridges + and -

+ Bridge operation is simpler requiring less packet processing

+ Bridge tables are self learning

- All traffic confined to spanning tree, even when alternative bandwidth is available

- Bridges do not offer protection from broadcast storms

Page 27: Link layer (2)

27

Routers vs. Bridges

Routers + and -

+ arbitrary topologies can be supported, cycling is limited by TTL counters (and good routing protocols)

+ scalable thanks to hierarchical routing, route aggregation

+ provide protection against broadcast storms

- require IP address configuration (not plug and play)

- require higher packet processing

Lesson: bridges do well in small (few hundred hosts) while routers used in large networks (thousands of hosts)

Page 28: Link layer (2)

28

Ethernet Switches

Essentially a multi-interface bridge

Layer 2 (frame) forwarding, filtering using LAN addresses

Switching: A-to-A’ and B-to-B’ simultaneously, no collisions

Large number of interfaces Often: individual hosts, star-

connected into switch Ethernet, but no collisions!

Page 29: Link layer (2)

29

Ethernet Switches

Cut-through switching: frame forwarded from input to output port without awaiting for assembly of entire frame slight reduction in latency

Combinations of shared/dedicated, 10/100/1000 Mbps interfaces

Page 30: Link layer (2)

30

Not an Atypical LAN (IP network)

Dedicated

Shared

Page 31: Link layer (2)

31

Summary Comparison

hubs bridges routers switches

trafficisolation

no yes yes yes

plug & play yes yes no yes

optimalrouting

no no yes no

cutthrough

yes no no yes

Page 32: Link layer (2)

32

Link Layer (2)

Wireless Links and LANs

Page 33: Link layer (2)

33

IEEE 802.11 Wireless LAN

802.11b 2.4-5 GHz unlicensed

radio spectrum up to 11 Mbps direct sequence spread

spectrum (DSSS) in physical layer

all hosts use same chipping code

widely deployed, using base stations

802.11a 5-6 GHz range up to 54 Mbps

802.11g 2.4-5 GHz range up to 54 Mbps

All use CSMA/CA for multiple access

All have base-station and ad-hoc network versions

Page 34: Link layer (2)

34

Base station approach

Wireless host communicates with a base station base station = access point (AP)

Basic Service Set (BSS) (a.k.a. “cell”) contains: wireless hosts access point (AP): base station

BSSs combined to form distribution system (DS)

Page 35: Link layer (2)

35

Ad Hoc Network Approach

No AP (i.e., base station) wireless hosts communicate with each other

to get packet from wireless host A to B may need to route through wireless hosts X,Y,Z

Applications: “laptop” meeting in conference room, car interconnection of “personal” devices (PAN = personal

area network) emergency services military

IETF MANET (Mobile Ad hoc Networks) working group

Page 36: Link layer (2)

36

IEEE 802.11: Multiple Access

Collision if 2 or more nodes transmit at same time

CSMA makes sense: get all the bandwidth if you’re the only one transmitting shouldn’t cause a collision if you sense another

transmission

Collision detection doesn’t work: hidden terminal problem

Page 37: Link layer (2)

37

IEEE 802.11 MAC Protocol: CSMA/CA

802.11 CSMA: sender

- if sense channel idle for DISF sec.

then transmit entire frame (no collision detection)

-if sense channel busy then binary backoff

802.11 CSMA receiver

- if received OK

return ACK after SIFS

(ACK is needed due to hidden terminal problem)

Page 38: Link layer (2)

38

Collision Avoidance Mechanisms

Problem: two nodes, hidden from each other, transmit complete

frames to base station wasted bandwidth for long duration !

Solution: small reservation packets nodes track reservation interval with internal

“network allocation vector” (NAV)

Page 39: Link layer (2)

39

Collision Avoidance: RTS-CTS Exchange

Sender transmits short RTS (request to send) packet: indicates duration of transmission

Receiver replies with short CTS (clear to send) packet notifying (possibly hidden)

nodes

Hidden nodes will not transmit for specified duration: NAV

Page 40: Link layer (2)

40

Collision Avoidance: RTS-CTS Exchange

RTS and CTS short: collisions less likely, of

shorter duration end result similar to collision

detection

IEEE 802.11 allows: CSMA CSMA/CA: reservations polling from AP

Page 41: Link layer (2)

41

A Word about Bluetooth

Low-power, small radius, wireless networking technology 10-100 meters

omnidirectional not line-of-sight infrared

Interconnects gadgets 2.4-2.5 GHz

unlicensed radio band up to 721 kbps

Interference from wireless LANs, digital cordless phones, microwave ovens: frequency hopping helps

MAC protocol supports: error correction ARQ

Each node has a 12-bit address

Page 42: Link layer (2)

42

SC250: Summary and Outlook

Topics covered: Principles underlying computer networks Architecture of TCP/IP and the Internet: end-to-end principle,

layers, protocols Touched on many topics, not always with sufficient level of

detail (but there are more classes coming...) You should now be able to understand the Internet, the

underlying principles, and be able to use it and to develop Internet applications

The IP hourglass... will it withstand the test of time?

HTTP, SMTP, RTSP, RTP,TCP,UDP, diffserv,...

10/100baseT, GigE, SONET, 802.11, Bluetooth,...

IP

Page 43: Link layer (2)

43

SC250 Summary and Outlook Topics not covered

Network design: as a networking engineer, how do you design a network, given some specifications?

User population, cost, robustness and security requirements, manageability/operations support...

Architecture? Protocols? Topology? Outsourcing vs. in-house? Standards or proprietary? Vendors and service providers? ...

Error control and correction: coding, information theory Physical layer: digital communications, information theory Security: cryptography, systems aspects More sophisticated service models for multimedia Wireless and mobile networking: mobile IP, ad hoc

(infrastructure-less networks),...

Page 44: Link layer (2)

44

SC250 Summary and Outlook My hope:

that this class got you interested in networking that you're convinced that the Internet is a great open platform

to be creative and to invent applications! Final exam:

similar in spirit to midterm: focus on understanding, not memorization

updated summary will be provided everything will be covered, but more emphasis on new material

since midterm Good luck!

Feedback on class welcome! Things missing, hard to understand, too much detail? (or really

great? :-) In relation to other classes, internships you take, problems you

try to solve...