EDUSAT SESSION FOR COMPUTER NETWORKS-I (C S64) Topic ...
Transcript of EDUSAT SESSION FOR COMPUTER NETWORKS-I (C S64) Topic ...
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
Notes
LAN Protocols
• Ethernet (IEEE 802.3 standard)
• Token Bus (IEEE 802.4 LAN standard)
• Token Ring (IEEE 802.5 LAN standard) and FDDIThis chapter deals in detail about the above technologies.LAN structure
• defines the structure of the network• contains both physical topology, which is the actual layout of the wire (media)
[bus, star, ring, extended star, hierarchical, mesh] and the logical topology, whichdefines how the media is accessed by the hosts [token passing]
Examples
The above figure shows how the hosts can be connected using any wiring media. This iscalled the bus topology. The circle depicts the nodes. They all share the same media. Thisis the simplest of all and easy to implement. Cost is less. Used in LAN. But only onecommunication can happen at a time.
This is the ring topology the hosts are connected in a ring fashion and uses a specialpacket called token for the communication between the hosts. The ring maintenance is aimportant issue not as simple as bus to implement
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
The above figure shows the star topology. There is a wiring hub to which the hosts areconnected. The data passes through the hub in the center. This is a very popular structureused in the LAN. The wiring hub can be a network device switch. The extended star alsois used. When all the nodes are connected to each other by the wiring media it becomesthe MESH topology.
The nodes are connected like a tree structure.
Satellite– nodes use an antenna to send and receive data– point-to-point from land based antenna to satellite– broadcast from the satellite to one or more ground stations
Hardware used in the hosts
NICsAdapters to connect devices to a networkPerform:
• framing• monitor the medium for transmissions• capture data from the medium and pass them to their hosts nodes for
processing• check errors• responsible for token passing
Also perform layer-1 function: convert bits to physical signals
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
• NIC works in two modes:– General mode– Promiscuous mode
• In general mode, the Ethernet card of the computer will allow following types ofpackets:
– Packets send to the computer.– Broadcast Packet– Multicast packet and if computer is part of that multicast group.
• In promiscuous mode, the Ethernet card of the computer will allow all the packetsthat it receives.
Limitations of layer 1
• Cannot organize streams of bits.• Cannot name or identify computers.• Cannot communicate with the upper-level layers.• Cannot decide which computer will transmit binary data.
And hence the layer 2 provides the following functions
• Layer 2 uses framing to organize or group the bits.• Layer 2 uses an addressing process to identify computers.• Layer 2 uses Logical Link Control (LLC) to communicate with the upper-level
layers.• Layer 2 uses Media Access Control (MAC) to decide which computer will
transmit.
Various LAN standards
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
IEEE has specified the following standardsThe Institute of Electrical and Electronic Engineers.LAN standards:802.1d: Spanning tree.802.2: LLC.802.3: MAC ~ Ethernet.802.5: MAC ~ Token ring.802.11: Wireless LAN.
Logical Link Control (LLC): Transitions up to the network layer.Media Access Control (MAC): Transitions down to media.
• LLC serves to communicate upward to Network layer, independent of the specificLAN technology used and Upper layer.
• MAC serves to access and communicate downward to the technology-specificPhysical layer.
LLC: receives a packet from the network layer and attaches a header it is called the PDUprotocol data unit and sends to the MAC through the interface it is called the SDU service
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
data unit and through the service access point SAP. The header will have DSAP d standsfor destination and SSAP s stands for the source.MAC: does the framing and the flow control.Concept of layer 21. Layer 2 uses framing to organize or group the data.2. Layer 2 uses a flat addressing convention.3. Layer 2 communicates with the upper-level layers through LLC.4. Layer 2 uses MAC to choose which computer will transmit binary data, from a groupin which all computers are trying to transmit at the same time.MAC Address
• Every computer has a unique way of identifying itself : MAC address or physicaladdress.
• The physical address is located on the Network Interface Card (NIC).• MAC addresses have no structure, and are considered flat address spaces.
It has 48 bits the first 24 bits are for the vendor and the next 24 bits are unique NICnumber.
• MAC addresses are sometimes referred to as burned-in addresses (BIAs) becausethey are burned into read-only memory (ROM) and are copied into random-accessmemory (RAM) when the NIC initializes.
• 0000.0c12.3456 or 00-00-0c-12-34-56MAC address are used by MAC layer to identify the destination.
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
LAN systems• Based on LAN architecture just seen
The IEEE 802 Standards are an integral part of the architecture:• LAN’s• Ethernet (CSMA/CD)• Token Ring and FDDI• Wireless• ATM LAN’s
CSMA/CD• Architecture that combines standards, topologies and protocols.• Carriers Sense Multiple Access with Collision Detection is the most commonly
used medium access control technique• Developed by Xerox as part of Ethernet• Basis for IEEE 802.3• Most popular ~ 70%• With CSMA, collision occupies medium for duration of transmission• Stations listen whilst transmitting• If medium idle, transmit• If busy, listen for idle, then transmit• If collision detected, jam, then cease transmission• After jam, wait random time then start again
802.3 operation parameters• Slot Time = 2 x prog delay + safety margin
– 10Mbps coaxial cable, 2.5 Km it is 512 bits
• Times between retransmission attempts is a number R x slot time
• 0 to R < 2K, where K = min(N, backoff limit)CSMA/CD parameters
• Mini slot time: time duration that is at least as big as two propagation delay• Mini slot is basis for contention resolution• Backoff algorithm: The first retransmission time involves zero or one minislot
times, the second involves 0,1,2,3 minislot times and each additional slotretransmission extends the range the range by a factor of 2 until the maximumrange of 1210
• The average number of minislots in a contention period is approximately e=2.71therefore the fraction
• The average number of minislots in a contention period is approximately e=2.71therefore the fraction of time that the channel is busy transmitting frames is
L/R = 1L/R+tprop+2etprop 1+6.44a
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
Where a=tprop R/LFrame format
There are three type of addresses unicast: permanently assigned to NIC multicast address:identify the group. Broadcast address: indicated by all 1s physical address. All stationsreceive the packet.FCS uses CRC(cyclic redundancy check ) for the error control. Pad bits are used to addsome bits if the length of the data frame is less because Ethernet requires minimum 512bytes.
Signaling rate(Mbps)
- Band -(Base orBroad)
Length (Meters)orCable Type
IEEE 802.3 are designated using the format above. For example 10BaseT means 10 is thesignalling rate in Mbps. Base is the Baseband. T stands for twisted pair.IEEE 802.3: 10Mbps specification (Ethernet)
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
10Base-FBFiberBackbone
10Base-FLFiber Link
10Base-FPFiber Passive
Medium fiber fiber 850 nm fiber
Signaling Baseband - Manchester/ on-off
Topology Point-to-point
Point-to-pointor star
Star
maxsegmentlength
2000 m 2000 m 500 m
max. Nodes/segment
2 2 33
MaxDiameter
2500 m 2500 m 2500 m
The above table shows the summary of the Ethernet 10Mbps
Ethernet hub and switch topologies using twisted pair cabling
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
The above figure shows the star topology and hub is used and it repeats the signal. Ifthere is a collision the hub sends the jam signal and the stations execute the backoffalgorithm. The stations are in the same collision domain.
The above figure shows that a switch or any other device connected where input portbuffers incoming the transmissions. The incoming frames are examined and transferred tothe appropriate output port.
10BaseT
• Provides three approaches to operating the LAN• First-stations are in collision domain• Second-hub operates as ethernet switch• Third- stations transmit in full duplex mode
Fast Ethernet100Base-TX 100Base-FX 100Base-T4
Medium Twisted pair fiber UTP
Signaling MLT-3 4B5B, NRZI 8B6T, NRZ
Topology Star Star Star
maxsegmentlength
100 m 412 m (half-duplex)2 km (full-duplex)
100 m
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
networkdiameter
200 m 400 m 200 m
The above table summarizes the fast Ethernet technology.Giga bit Ethernet
• 1000Base-SX (short wavelength fiber)– Short wavelength (770-860 nm)– support duplex links of
• 220- 275 m using 62.5 m multimode fiber• 500- 550 m using 50 m multimode fiber
• 1000Base-LX (long wavelength fiber)– Long wavelength (1270-1355 nm)– support duplex links of
• 550 m using 62.5 m or 50 m multimode fiber• 5000 m using 9 m single-mode fiber
• 1000Base-CX (short haul copper)– supports 1-Gbps links within a single room or equipment rack– uses copper jumpers , special shielded twisted pair that spans no more
than 25 m• 1000Base-T
– uses 4 pairs of cat 5 UTP– support devices over a range of 100m
• Encoding scheme for Gigabit Ethernet is 8B/10BApplication of fast and gigabit Ethernet
The above figure shows the application of the fast and gigabit Ethernet technology. Thereare three departments and has the LANS the hosts are connected using a hub, the
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
topology is star. The link used is 10Mbps. The other two Lans are also implemented inthe same way. The three LANs are connected to their respective server using a switch and100Mbps links.All the three LANs are linked together using routers and a gigabit link in the backbone.
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
Token Ring 802.5• MAC protocol
– Small frame (token) circulates when idle– Station waits for token– Changes one bit in token to make it SOF for data frame– Append rest of data frame– Frame makes round trip and is absorbed by transmitting station– Station then inserts new token when transmission has finished and leading
edge of returning frame arrives– Under light loads, some inefficiency– Under heavy loads, round robin
Token ring format
• Tokens are 3 bytes in length and consists of a start delimiter, an access controlbyte, and an end delimiter.
• The start delimiter alerts each station to the arrival of a token, or data/commandframe. This field also includes signals that distinguish the byte from the rest of theframe by violating the encoding scheme used elsewhere in the frame.
• The access control byte contains the priority and reservation field, and a tokenand monitor bit. The token bit distinguishes a token from a data/command frame,and a monitor bit determines whether a frame is continuously circling the ring.The bit pattern for access control is PPP T M RRRPPP- indicate priority of token
T- token bit, T=0 -indicates token frame and T=1 indicates data frameM- monitor bit used by monitor to remove orphan frames.RRR- is used for reserving token priority Frame control byte has the pattern FF ZZZZZZ to distinguish between data
frame and control frame
Two types of token ring frames: Data/Commandand Token
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
FF= 01 indicates data frameFF=00 indicates control frame then ZZZZZZ indicates type of control frame. SA and DA are as in 802.3 FCS - frame check sequence having CRC checksum Ending delimiter has last two bits to be I and E where
E- error bit, this bit is set if any station detects an error like line coding violation orframe check sequence error.
I- intermediate frame bit , it is set one to indicate last frame in the sequence of framesthat are transmitted. Frame status - has the pattern A C XX A C XX and it allows receiving station to
convey the data transfer status to sending station.A= 1 indicates destination address was recognized by receiving station.C=1 indicates that the frame was copied to receivers boffer properly
Token ring passing
• Token-passing networks move a small frame, called a token, around the network.• Possession of the token grants the right to transmit data.• If a node that receives a token has no information to send, it passes the token to
the next end station.• Each station can hold the token for a maximum period of time, depending on the
specific technology that has been implemented.• When a token is passed to a host that has information to transmit, the host seizes
the token and alters 1 bit of it. The token becomes a start-of-frame sequence.• Next, the station appends the information to transmit to the token and sends this
data to the next station on the ring. There is no token on the network while theinformation frame is circling the ring, unless the ring supports early token
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
releases. Other stations on the ring cannot transmit at this time. They must waitfor the token to become available.
• Token Ring networks have no collisions. If early token release is supported, a newtoken can be released when the frame transmission has been completed.
• The information frame circulates around the ring until it reaches the intendeddestination station, which copies the information for processing. The informationframe continues around the ring until it reaches the sending station, where it isremoved. The sending station can verify whether the frame was received andcopied by the destination.
• Unlike CSMA/CD networks, such as Ethernet, token-passing networks aredeterministic. This means that you can calculate the maximum time that will passbefore any end station will be able to transmit.
• This feature, and several reliability features, makes Token Ring networks ideal forapplications where any delay must be predictable, and robust network operation isimportant. Factory automation environments are examples of predictable robustnetwork operations.
• Token Ring networks use a sophisticated priority system that permits certain user-designated, high-priority stations to use the network more frequently. Token Ringframes have two fields that control priority - the priority field and the reservationfield.
• Only stations with a priority equal to, or higher than, the priority value containedin a token can seize that token.
• Once the token has been seized and changed to an information frame, onlystations with a priority value higher than that of the transmitting station canreserve the token for the next network pass.
• The next token generated includes the higher priority of the reserving station.Stations that raise a token's priority level must reinstate the previous priority whentheir transmission has been completed.
• Token Ring networks use several mechanisms for detecting and compensating fornetwork faults.
• One mechanism is to select one station in the Token Ring network to be the activemonitor. This station acts as a centralized source of timing information for otherring stations and performs a variety of ring maintenance functions. The activemonitor station can potentially be any station.
• One of this station’s functions is to remove continuously circulating frames fromthe ring. When a sending device fails, its frame may continue to circle the ringand prevent other stations from transmitting their frames, which can lock up thenetwork. The active monitor can detect these frames, remove them from the ring,and generate a new token.
• The IBM Token Ring network's physical star topology also contributes to overallnetwork reliability. Active MSAUs (multi-station access units) can see all
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
information in a Token Ring network enabling them to check for problems and toselectively remove stations when necessary.
• Beaconing - a Token Ring formula - detects and tries to repair network faults.When a station detects a serious problem with the network (e.g. a cable break) itsends a beacon frame. The beacon frame defines a failure domain. A failuredomain includes the station that is reporting the failure, its nearest activeupstream neighbor (NAUN), and everything in between.
• Beaconing initiates a process called autoreconfiguration, where nodes within thefailure domain automatically perform diagnostics. This is an attempt toreconfigure the network around the failed areas.
• Physically, MSAUs can accomplish this through electrical reconfiguration.• The 4/16 Mbps Token Ring networks use differential Manchester encoding.• Token Ring uses the differential Manchester encoding method to encode clock
and data bit information into bit symbols.Token Ring network stations are directly connected to MSAUs and can be wired togetherto form one large ring.Patch cables connect MSAUs to other MSAUs that are adjacent.Lobe cables connect MSAUs to stations. MSAUs include bypass relays for removingstations from the ring.
FDDI
Fiber Distributed Data Interface (FDDI) came about because system managers becameconcerned with network reliability issues as mission-critical applications wereimplemented on high-speed networks.FDDI is frequently used as a backbone technology and to connect high-speed computersin a LAN.FDDI has four specifications:MediaAccessControl—defineshowthemediumis accessedframe formattoken handlingaddressing algorithm forcalculating a cyclic redundancy check and error-recovery mechanismsFDDI has four specifications:
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
Physical Layer Protocol—defines data encoding/decoding proceduresclocking requirements framingFDDI has four specifications:Physical Layer Medium—defines the characteristics of the transmission medium fiberoptic link power levels bit error rates optical components connectorsFDDI has four specifications:Station Management—defines the FDDI station configuration ring configuration ringcontrol features stationinsertion and removal initialization fault isolation and recoveryRecovery collection of statisticsUnlike CSMA/CD networks, such as Ethernet, token-passing networks are deterministic--you can calculate the maximum time that will pass before any end station will be able totransmit. FDDI's dual ring makes FDDI very reliable.FDDI supports real-time allocationof network bandwidth, making it ideal for a variety ofdifferent application types. FDDI provides this support by defining two types of traffic –synchronous and asynchronous.
• Synchronous traffic can consume a portion of the 100 Mbps total bandwidth of anFDDI network, while asynchronous traffic can consume the rest.
• Synchronous bandwidth is allocated to those stations requiring continuoustransmission capability. This is useful for transmitting voice and videoinformation.
• The remaining bandwidth is used for asynchronous transmissions.• The FDDI SMT specification defines a distributed bidding scheme to allocate
FDDI bandwidth• Asynchronous bandwidth is allocated using an eight-level priority scheme. Each
station is assigned an asynchronous priority level.• FDDI also permits extended dialogues, in which stations may temporarily use all
asynchronous bandwidth.• The FDDI priority mechanism can lock out stations that cannot use synchronous
bandwidth and that have too low an asynchronous priority.• FDDI uses an encoding scheme called 4B/5B. Every 4 bits of data are sent as a 5
bit code. The signal sources in FDDI transceivers are LEDs or lasers.• FDDI specifies a 100 Mbps, token-passing, dual-ring LAN that uses a fiber-optic
transmission medium.• It defines the physical layer and media access portion of the data link layer,
which is similar to IEEE 802.3 and IEEE 802.5 in its relationship to the OSIModel.
• Although it operates at faster speeds, FDDI is similar to Token Ring.• The two networks share a few features, such as topology (ring) and media access
technique (token-passing). A characteristic of FDDI is its use of optical fiber as atransmission medium.
• Optical fiber is exploding in popularity as a networking medium, being installedat a rate of 4000 miles per day in the United States.
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
• Single-mode fiber is capable of higher bandwidth and greater cable run distancesthan multi-mode fiber.
• Because of these characteristics, single-mode fiber is often used for inter-building connectivity while multi-mode fiber is often used for intra-buildingconnectivity.
• Multi-mode fiber uses LEDs as the light-generating devices while single-modefiber generally uses lasers.
• FDDI specifies the use of dual rings for physical connections. Traffic on eachring travels in opposite directions.
• Physically, the rings consist of two or more point-to-point connections betweenadjacent stations.
• One of the two FDDI rings is called the primary ring; the other is called thesecondary ring.
• The primary ring is used for data transmission; the secondary ring is generallyused as a back up.
• Class B, or single-attachment stations (SAS), attach to one ring; Class A, or dualattachment stations (DAS), attach to both rings.
• SASs are attached to the primary ring through a concentrator, which providesconnections for multiple SASs. The concentrator ensures that a failure, or powerdown, of any given SAS, does not interrupt the ring. This is Particularly usefulwhen PCs, or similar devices that frequently power on and off, connect to thering.
• Each FDDI DAS has two ports, designated A and B. These ports connect thestation to dual FDDI ring; therefore each port provides a connection for bothprimary and secondary rings.
Example Ring Latency and Token reinsertion
• Let there be M stations• b bits delay in stations• The delay in interface is Mb bits• typically b=2.5• d total ring length• additional delay is d/v or dR/v v-delay in medium• v=2*108 m/sec• therefore it is 5microsec to travel 1 kms• ring latency is defined as the time that it takes for a bit to travel around ring is
given by• T’=d/v+Mb/R and T’R= dR/v+Mb bits• Example• Let R=4Mbps M=20 stations separated by 100m b=2.5• Latency= 20*100*4*106 /2*108 +20*2.5=90 bits
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
• IEEE 802.5-After the last bit arrives the token is inserted• IBM token ring-after the header bit arrives the token is inserted• IEEE 802.5 and IBM token ring 26Mbps- after last bit transmitted the token is
inserted• Conclusion-improves efficiency in case of the third case.
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
FDDI MAC Protocol• As for 802.5 except:• Station seizes token by aborting token transmission• Once token captured, one or more data frames transmitted• New token released as soon as transmission finished (early token release in 802.5)• Handle two type of traffic• synchronous-tight transfer delay requirement-voice or video• asynchronous-greater delay tolerance-data• TTRT-target token rotation time-all stations agree to operate• Every station is allotted time S during which it can send the synchronous traffic.• If the sum of Si times is smaller than TTRT then token will return to every node
in less than 2 TTRT sec.• and hence meets the delay requirement• Each station maintains TRT-token rotation timer: measures the time elapsed since
the station last received the token.• When a station receives the token it calculates THT-token hold time:
THT=TTRT=TRT• if THT>0 all synchronous and asynchronous traffic is sent• if THT<0 only synchronous traffic is allowed
FDDI operation
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
Wireless LAN 802.11
Protocol stack Frame structure MAC protocol services
The above figure shows the protocol stack of the wireless LANWhy not Ethernet ?Several reasons as to why it cannot be used
• difficult to detect collisions• not controlled as the wired ones• Hidden station problem
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
The above figure shows the hidden station problemInfrastructure networks
• Basic Service Set (BSS) contains:– wireless hosts– access point (AP): base station
• BSS’s combined to form distribution system (DS) to form a extended service setESS
• ESS provide gateway access for wireless users into wired network. This access isdone through a device called portal
The figure shows the distributed system.Different services associated with the wireless lan are
• Association• Disassociation• Reassociation• Distribution• Integration
Intracell services• Authentication• Deauthentication
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
• Privacy• Data Delivery
Adhoc networks• Ad hoc network: IEEE 802.11 stations can dynamically form network without AP• Applications:
– “laptop” meeting in conference room, car– interconnection of “personal” devices– battlefield
Frame structure
There are three types of frames
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
Management frame-used for station association and dissociation with the APtiming and synchronization and authentication and deauthentication
Control frame-used for handshaking and for positive ack Data frame-for transmission of data MAC header provides information on frame control, duration, addressing and
sequence control MAC sublayer is responsible for channel access procedures, pdu addressing
,formatting, fragmentation and reassembly of MSDUs supports security services through authentication and privacy mechanisms management services support roaming within and ESS and assist stations in
power management. The figure on the next figure shows the MAC architecture
It is defined using the coordination functionsDCF offers the contention service where the stations have to contend to use the channel.Uses CSMA/CAThe basic operation is as follows
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
• 802.11 CSMA: sender• - if sense channel idle for DISF sec.• then transmit entire frame (no collision detection)• -if sense channel busy then binary backoff
• 802.11 CSMA receiver:• if received OK• return ACK after SIFS
• CSMA/CA: explicit channel reservation– sender: send short RTS: request to send
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
– receiver: reply with short CTS: clear to send• CTS reserves channel for sender, notifying (possibly hidden) stations• avoid hidden station collisions• RTS and CTS short:
– collisions less likely, of shorter duration– end result similar to collision detection
• IEEE 802.11 alows:– CSMA– CSMA/CA: reservations– polling from AP
Physical layer
It is defined to operate with its MAC layerThere are three types of frame format. Frequency hopping spread spectrum Direct sequence spread spectrum Infrared frame format
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
LAN bridgesLimitations of hubs
• single collision domain results in no increase in max throughput– multi-tier throughput same as single segment throughput
• individual LAN restrictions pose limits on number of nodes in same collisiondomain and on total allowed geographical coverage
• cannot connect different Ethernet types (e.g., 10BaseT and 100baseT)Bridges
• A network component connecting LAN’s together.• Operates only in the data link layer, thus is can handle any network protocol used.• May be used
– to divide the large expensive and hard to manage network into smallerLAN’s.
– split networks that became loaded over time.– to handle larger distances.– to block some traffic leaking outside the network.
Link Layer devices: operate on Ethernet frames, examining frame header and selectivelyforwarding frame based on its destinationBridge isolates collision domains since it buffers framesWhen frame is to be forwarded on segment, bridge uses CSMA/CD to access segmentand transmit
• Bridge advantages:– Isolates collision domains resulting in higher total max throughput, and
does not limit the number of nodes nor geographical coverage
– Can connect different type Ethernet since it is a store and forward device
– Transparent: no need for any change to hosts LAN adapters
• bridges filter packets– same-LAN -segment frames not forwarded onto other LAN segments
• forwarding:– how to know which LAN segment on which to forward frame?– looks like a routing problem (more shortly!)
• Reasons for bridges– Limited number of stations on a LAN segment or ring– Limited distance for executing CSMA / CD algorithm or distance one
wants a token traveling on a ring– Limited traffic on a single LAN: available bandwidth must be shared by
all stations• Interconnecting networks
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
– Networks connected at the physical layer are connected by a repeater– Networks connected at the MAC or link layer are connected by bridges– Networks connected at the network layer are connected by routers– Higher layer interconnection devices that perhaps execute additional
functions such as protocol conversion are often called gateways• Bridges
– Devices for gluing together LANs so that packets can be forwarded fromone LAN to the other
A bridged LAN
Interconnection by bridge
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
• The no frills bridge : simply transmit all traffic from one LAN segment onto allthe other segments
– Advantages: two stations can be transmitting at the same time. Bridgewill buffer a packet until it can transmit on a LAN
– Disadvantages: total bandwidth still that can be safely utilized is still theminimum bandwidth of each LAN segment
• Keeping a database of all stations on each LAN segment– Manually enter addresses in such a database– Partition addresses into ranges on each LAN
• Eg. LAN 1 has 1-50, LAN 2 has 51-100, LAN 3 has 101-150– Have the MAC address be hierarchically divided into a LAN address and a
station address (like the IP address)– None of these solutions are really used
• Better solution: the transparent learning bridge– Learn on which segment a station resides– Transmit a packet only onto the correct segment
• bridges learn which hosts can be reached through which interfaces: maintainfiltering tables
– when frame received, bridge “learns” location of sender: incoming LANsegment
– records sender location in filtering table• filtering table entry:
– (Node LAN Address, Bridge Interface, Time Stamp)– stale entries in Filtering Table dropped (TTL can be 60 minutes)
• filtering procedure:– if destination is on LAN on which frame was received
• then drop the frame• else { lookup filtering table• if entry found for destination
• then forward the frame on interface indicated;• else flood; /* forward on all but the interface on
which the frame arrived*/• }
Transparent bridge• Main idea: A bridge should easily connect any set of LAN’s together and make
the connection transparent to the stations.• No maintenance, software upgrade and routing table upload should be necessary.• The bridge listens to both network at all times.• Any frame received is buffered.
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
• Next the bridge should be able to decide if the frame was addressed to a station inthe same network. If not, it should select the proper LAN and broadcast the framethere.
• Backward Learning:• The bridge keeps a table containing hashed (address, network) entry pairs.• The bridge accepts any frame, if the destination address is in the table then
the frame is forwarded to the proper network, otherwise the frame isbroadcast onto all networks (except the one its coming from).
• For each incoming frame the bridge also read the source address andupdates the hash table by inserting the source address and the network idinto the tables.
• Entries in the table can live for a certain time, and if there is no packettraffic from or to that an address the entry is removed from the table.
• Maintain a forwarding database or cache of station MAC addresses and the bridgeport that the stations are on
• Promiscuously listen to packets arriving on any port• For each packet arriving at the bridge:
• Store the stations source address and arriving port in the cache (if an entryalready exists for an address update if different)
– determine if the destination address is in the cache• If entry then forward only on the appropriate port unless the port is
the same as the arrival port• If no such entry then forward packet on all segments except the
one the packet was received on.– Age each entry in the cache and delete after an appropriate time
Spanning tree bridge• for increased reliability, desirable to have redundant, alternate paths from source
to dest• with multiple simultaneous paths, cycles result - bridges may multiply and
forward frame forever• solution: organize bridges in a spanning tree by disabling subset of interfaces
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
• As the system grows a complex graph of many networks and many bridgesappear.
• Frames may loop through networks!• Bridges communicate to build dynamic spanning tree graph, showing the
topology of the network.• Spanning tree graphs avoid loops.
• First the bridge with the smallest serial number becomes the root of the tree.• Next the tree is constructed. LAN’s are placed on the nodes, and bridges are
placed on the vertices.• If a LAN or bridge is no longer present the tree is updated.• All networks are on the tree but to prevent loops some of the bridges are left off
the graph. This makes the graph a tree• Elect a single bridge among all bridges as the root bridge. The algorithm will
select the root bridge as the one with the lowest bridge id.• Each bridge (except root) determines the least cost path (shortest path with respect
to some metric, say hops) from itself to the root bridge through each of its ports.The port with least cost is the root port for that bridge. In case of ties use thesmallest port id.
• Elect a designated bridge for each LAN from the bridges directly connecting tothat LAN. The designated bride is the one closest to the root bridge. In case of
Disabled
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
ties it is the one with the lowest bridge id. The port that connects the designatedbridge and the LAN is the designated port for that LAN.
• Ports in the spanning tree are all root ports and designated ports. Other ports arein the blocking state.
• Data traffic is forwarded to and received from ports in the spanning tree only.ExampleSample topology
using spanning tree
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
How algorithm works• Bridges exchange bridge protocol data units (BPDUs). These have configuration
messages consisting of:– Root ID, bridge assumed by sending bridge to be the root– Transmitting bridge ID– Cost of least cost path to the root of which the transmitting bridge is aware
• When a bridge receives a configuration message from a neighbor bridge, itcompares this with what it would transmit over that port. Note that it will add thecost to the received message before comparison. It saves the best configurationmessage received for each port. If the saved configuration is better than what itwould transmit it stops transmitting BPDUs over that
• All bridges start by transmitting on all ports:– Root id is own id– Transmitting id is own id– Cost is 0– (Port id of port)– Which is a better message?
First compare root ID, lower is betterIf tie, next compare costs, lower is betterIf tie, next compare transmitting ID, lower is betterIf still tie, port id is tie breakerEventually only the root bridge is transmitting.
Source routing bridges• CSMA/CD community preferred to use transparent bridges due to their
simplicity.• The Token Ring community, however, preferred source routing bridges.• In source routing, the sending station knows whether the destination is on the
same network. If it is not, the sender sets the higher destination address bit to 1and includes the exact path to the frame header.
• The path is a sequence of alternating bridge and LAN addresses (4bits/12bits).• This requires that each machine know the topology and can construct a path to
any receiver.• Instead, the sender first broadcasts a discovery frame asking the receiver to signal
himself. In the return trip bridges record their addresses in the frame header andthe path is formed.
• Problem: Too many frame loose in the network.
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
Frame format
The routing information field is inserted only if the stations are on different LANs if this field is present, then I/G bit in src addr field is 1 otherwise it is 0 The routing control field defines: type of frame, length of routing information
field and direction of the route designator field(L to R or R to L)Route discovery
First the src stn. Transmits the single route broadcast frame on its LAN withoutthe route designator field.
this frame should appear exactly once and hence selected bridges form spanningtree
Once the selected bridge at the first hop receives this frame inserts an incoming LAN number bridge number outgoing LAN number in the routing information field
Then forwards on outgoing LAN At the other hop when a selected bridge receives this frame inserts bridge number
and outgoing LAN number and forwards on outgoing LAN Non selected bridge simply ignore this frame Once the receiver gets this frame it broadcasts all routes broadcast frame with no
route designator fields This frame generates all possible routes back to the src stn After collecting all routes the source station selects the best route and saves it To prevent all routes broad cast frames from circulating in the network, the bridge
first checks whether the outgoing LAN number is already recorded, if so it doesnot forward the frame
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
Example
Assume that B1,B3,B4 and B6 are part of spanning tree S1 wants to send a frame to S3 The next slide shows the routes followed by single route broadcast frame and all
routes broadcast framesSingle frame
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
ALL route broad cast frame
Example
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
• Suppose C sends frame to D and D replies back with frame to C• C sends frame, bridge has no info about D, so floods to both LANs
– bridge notes that C is on port 1– frame ignored on upper LAN– frame received by D– D generates reply to C, sends– bridge sees frame from D– bridge notes that D is on interface 2– bridge knows C on interface 1, so selectively forwards frame out via
interface
Mixed media bridges
Interconnect LANs of different types Example ethernet and token ring These differ in frame format, opeartion and speed and these issues to be taken
care of Since the frame formats are different reformatting is done and new FCS is used.
But adds processing overhead. Since the data rate is different the bridge should have sufficient buffering capacity Two approaches used are : translational bridging
source route transparent bridging
Switch
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
• used to concentrate connectivity• combine the connectivity of a hub with the traffic regulation of a bridge• switch frames from incoming ports to outgoing ports providing each port with full
bandwidth• provide separate data paths
switch functions
– Address learning– Forward/filter decision– Loop avoidance
VLANs
• In a typical shared LAN...– Users are grouped physically based on the hub they are plugged into– Routers segment the LAN and provide broadcast firewalls
• In VLANs...– you can group users logically by function, department or application in use– configuration is done through proprietary software– VLANs can logically segment users into different subnets (broadcast
domains)– Broadcast frames are only switched between ports on the switch or
switches with the same VLAN ID.– Users can be logically group via software based on:
• port number• MAC address• protocol being used• application being used
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
The above figure shows the difference between a LAN and a VLAN• VLANs...
– work at Layer 2 & 3– control network broadcasts– allow users to be assigned by net admin.– provide tighter network security
The figure shows the formation of a VLAN
• A router provides connection between different VLANs• For example, you have VLAN1 and VLAN2.
– Within the switch, users on separate VLANs cannot talk to each other(benefit of a VLAN!)
– However, users on VLAN1 can email users on VLAN2 but they need arouter to do it.
• Switches make filtering and forwarding decisions based on data in the frame.• There are two techniques used.
– Frame Filtering--examines particular information about each frame (MACaddress or layer 3 protocol type)
– Frame Tagging--places a unique identifier in the header of each frame as itis forwarded throughout the network backbone.
EDUSAT SESSION FOR COMPUTER NETWORKS-I (CS64)Date: 08.03.06/13.03.06/14.03.06/15.03.06/20.03.06/21.03.06/22.03.06/27.03.06Session IV-XITopic: Chapter 2 Local Area NetworksFaculty: Anita KanavalliMSRIT
• Three methods for implementing VLANs– Port-Centric– Static– Dynamic
• Each switched port can be assigned to a VLAN. This...– ensures ports that do not share the same VLAN do not share broadcasts.– ensures ports that do share the same VLAN will share broadcasts.
VLAN benefits
• Traveling Users– 20% to 40% of work force moves every year
• net admin’s biggest headache• largest expense in managing networks. Moves may require...
– recabling– readdressing and reconfiguration
– VLANs provide a way to control these costs. As long as the user stillbelongs to the same VLAN...
• simply configure the new switch port to that VLAN• router configuration remains intact
– Routers provide an effective firewall against broadcasts– Adding VLANs can extend a router’s firewall capabilities to the “switch
fabric”– The smaller the VLAN, the smaller the number of users that are effected
by broadcasts– Shared LANs are easy to penetrate...simply plug into the shared hub.– VLANs increase security by ...
• restricting number of users in a VLAN• preventing user access without authorization• configuring all unused ports to the “Disabled” setting• control access by
– addresses– application types– protocol types
• Hub Replacement & Segmentation– The ports on a non-intelligent hub can only be assigned one VLAN.– Replacing hubs with switches is relatively cheap compared to the benefit
gained.– In the graphic, replacing the core hub in an extended star topology with a
VLAN capable switch effectively microsegments one shared LAN intosix.
________________________________________________________________________