3 Underlying Technologies.pptx

49
Underlying Technologies Computer Networks Tutun Juhana Telecommunication Engineering School of Electrical Engineering & Informatics Institut Teknologi Bandung 3

Transcript of 3 Underlying Technologies.pptx

Page 1: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 1/49

Underlying TechnologiesComputer Networks

Tutun JuhanaTelecommunication EngineeringSchool of Electrical Engineering & Informatics

Institut Teknologi Bandung

3

Page 2: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 2/49

Objectives

• To briefly discuss the technology of dominant wiredLANs, Ethernet, including traditional, fast, gigabit, and

ten-gigabit Ethernet

• To briefly discuss the technology of wireless WANs,

including IEEE 802.11 LANs, and Bluetooth• To briefly discuss the technology of point-to-point WANs

including 56K modems, DSL, cable modem, T-lines, and

SONET

• To briefly discuss the technology of switched WANsincluding X.25, Frame Relay, and ATM

• To discuss the need and use of connecting devices such

as repeaters (hubs), bridges (two-layer switches), and

routers (three-layer switches)2

Page 3: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 3/49

WIRED LOCAL AREA NETWORKS

3

Page 4: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 4/49

•  A local area network (LAN) is a computer

network that is designed for a limited

geographic area such as a building or a

campus

• Most LANs today are also linked to a wide

area network (WAN) or the Internet

4

Page 5: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 5/49

IEEE Standard Project 802, designed toregulate the manufacturing and

interconnectivity between different LANs

FDDIFiber Distributed Data Interface

Token Ring

Token Bus

 ATM LAN

5

Page 6: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 6/49

IEEE Standards

• Project 802 is a way of specifying

functions of the physical layer and the data

link layer of major LAN protocols

6

Page 7: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 7/49

The Ethernet

• Robert Melancton

"Bob" Metcalfe

(born April 7,1946)

is an electricalengineer from the

United States who

co-inventedEthernet

7

Page 8: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 8/49

Frame Format

„Length” used byIEEE standard to

define the number of

bytes in the data field

“Type” used by

original Ethernet todefine upper-layer

protocol using the

frame

8

Page 9: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 9/49

Frame Length

Reason for the maximum length restriction:

1. To reduce the size of the buffer (memory was very expensive when Ethernet was

designed)

2. It prevents one station from monopolizing the shared medium

• The minimum length restriction is required for the correct operation of CSMA/CD

• If the upper-layer packet is less than 46 bytes, padding is added to make up the

difference

9

Page 10: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 10/49

 Addressing

• Each station on an Ethernet network has its ownnetwork interface card (NIC)

• The NIC provides the station with a 6-byte

physical address10

Page 11: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 11/49

• Ethernet Address

 – The address normally is referred to as the

data link address, physical address, or MAC

address

11

Page 12: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 12/49

12

Example:

• 00-14-22 OUI for Dell

• 00-04-DC for Nortel

• 00-40-96 for Cisco

• 00-30-BD for Belkin

Page 13: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 13/49

• The address is sent left-to-right, byte by byte

• For each byte, it is sent right-to-left, bit by bit

• Example

 – Show how the address 47:20:1B:2E:08:EE is sent outon line

13

Page 14: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 14/49

Unicast, Multicast, and Broadcast Addresses

•  A source address is always a unicast

address 

 – the frame comes from only one station

• The destination address can be unicast ,

multicast , or broadcast

14

Page 15: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 15/49

• The broadcast address is a special case of

the multicast address; the recipients are allthe stations on the LAN

15

Page 16: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 16/49

• Define the type of the following destination

addresses

 – 4A:30:10:21:10:1A

 – 47:20:1B:2E:08:EE

 – FF:FF:FF:FF:FF:FF

16

Page 17: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 17/49

Ethernet Evolution

17

Page 18: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 18/49

STANDARD ETHERNET

18

Page 19: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 19/49

 Access Method: CSMA/CD

• The IEEE 802.3 standard defines carrier

sense multiple access with collision

detection (CSMA/CD) as the access

method for traditional Ethernet

19

Page 20: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 20/49

• Stations on a traditional Ethernet can beconnected together using a physical bus or star

topology , but the logical topology is always a bus

20

Physical star, logically bus topologyPhysical bus topology

• The medium (channel) is shared between stations and only one station at

a time can use it

•  All stations receive a frame sent by a station (broadcasting)

• The real destination keeps the frame while the rest drop it

Page 21: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 21/49

• How can we be

sure that two

stations are not

using the medium atthe same time?

• If they do, their

frames will collidewith each other

21

Page 22: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 22/49

Page 23: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 23/49

• To minimize the chance of collision and,

therefore, increase the performance, the

CSMA method was developed

23

Page 24: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 24/49

Page 25: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 25/49

Space/time model of a collision in CSMA

25

Page 26: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 26/49

Collision of the first bit in CSMA/CD

•  A transmits for the duration t4 - t1; C transmits for the duration t3 - t2

 for the protocol to work, the length of any frame divided by the bitrate in this protocol must be more than either of these durations

• Before sending the last bit of the frame, the sending station must

detect a collision, if any, and abort the transmission because, once

the entire frame is sent, station does not keep a copy of the frame and

does not monitor the line for collision detection 26

Page 27: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 27/49

Minimum Frame Size

27

The worst collision on a shared bushttp://cnp3book.info.ucl.ac.be/lan/lan/

Page 28: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 28/49

28

• The frame transmission time T fr  must be at

least two times the maximum propagation

time T  p 

Page 29: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 29/49

• Example

 – In the standard Ethernet, if the maximum

propagation time is 25.6 μs, what is the

minimum size of the frame?

29

Page 30: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 30/49

CSMA/CD flow diagram

30

The station transmits

and receives

continuously and

simultaneously

(using two different

ports)

Page 31: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 31/49

Implementation

31

Page 32: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 32/49

FAST ETHERNET

32

Page 33: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 33/49

• IEEE created Fast Ethernet under the name 802.3u• Fast Ethernet is backward-compatible with Standard

Ethernet, but 10 times faster (100 Mbps)

• The goals of Fast Ethernet:

1. Upgrade the data rate to 100 Mbps2. Make it compatible with Standard Ethernet

3. Keep the same 48-bit address.

4. Keep the same frame format.

5. Keep the same minimum and maximum frame lengths

33

Page 34: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 34/49

MAC Sublayer

• Keep only the star topology – There are two choices: half duplex and full duplex

 – In the half-duplex approach, the stations are

connected via a hub

 – in the full-duplex approach, the connection is madevia a switch with buffers at each port

• The access method is the same (CSMA/CD) for

the half-duplex approach

• For full-duplex there is no need for CSMA/CD

 – The implementations keep CSMA/CD for backward

compatibility with Standard Ethernet

34

Page 35: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 35/49

 Autonegotiation

•  Autonegotiation allows twodevices to negotiate the mode

or data rate of operation

• It was designed particularly for

the following purposes:

 – To allow incompatible devices to

connect to one another

 – To allow one device to have

multiple capabilities

 – To allow a station to check a

hub‟s capabilities. 

35

Page 36: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 36/49

Implementation

36

Page 37: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 37/49

GIGABIT ETHERNET

37

Page 38: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 38/49

Page 39: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 39/49

MAC Sublayer

•  A main consideration: keep the MACsublayer untouched To achieve a data

rate of 1 Gbps, this was no longer possible

• Gigabit Ethernet has two distinctiveapproaches for medium access

1. Half-duplex

2. Full-duplex•  Almost all implementations of Gigabit

Ethernet follow the full-duplex approach

39

Page 40: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 40/49

Full-Duplex Mode

• There is a central switch connected to allcomputers or other switches

 – Each switch has buffers for each input port in which

data are stored until they are transmitted

• There is no collision in this mode  CSMA/CDis not used

• The maximum length of the cable is determined

by the signal attenuation in the cable, not by the

collision detection process

40

Page 41: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 41/49

Half-Duplex Mode

•  A switch can be replaced by a hub a

collision might occur CSMA/CD is used

 the maximum length of the network is

totally dependent on the minimum framesize

• Three solutions have been defined:

1. Traditional

2. Carrier extension

3. Frame bursting

41

Page 42: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 42/49

• Traditional approach

 – Keep the minimum frame length 512 bits

 – The maximum network length only 25 m

(because the length of a bit is 1/100 shorterthan in standard Ethernet)

• It may not even be long enough to connect the

computers in one single office

42

Page 43: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 43/49

Page 44: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 44/49

Carrier Extension is very inefficient if we

have a series of short frames to send (each

frame carries redundant data)

44

Page 45: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 45/49

• Frame Bursting – To improve efficiency, frame bursting was proposed

 – Instead of adding an extension to each frame,

multiple frames are sent

• To make these multiple frames look like one frame, paddingis added between the frames (96 bits) so that the channel is

not idle The method deceives other stations into thinking

that a very large frame has been transmitted

45

512 bytes

ExtensionFrame Frame Frame Frame

Frame burst

Maximum frame burst is 8192 bytes

Page 46: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 46/49

Gigabit Ethernet Implementation

46

Page 47: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 47/49

TEN-GIGABIT ETHERNET

47

Page 48: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 48/49

• Ten-Gigabit Ethernet standard : IEEE802.3ae• The goals :

1. Upgrade the data rate to 10 Gbps.

2. Make it compatible with Standard, Fast, and Gigabit Ethernet.

3. Use the same 48-bit address.4. Use the same frame format.

5. Keep the same minimum and maximum frame lengths.

6. Allow the interconnection of existing LANs into a metropolitan

area network (MAN) or a wide area network (WAN)

7. Make Ethernet compatible with technologies such as Frame

Relay and ATM.

48

Page 49: 3 Underlying Technologies.pptx

8/13/2019 3 Underlying Technologies.pptx

http://slidepdf.com/reader/full/3-underlying-technologiespptx 49/49

Implementation

• Ten-Gigabit Ethernet operates only in fullduplex mode no need for contention 

CSMA/CD is not used

49