Local Area Networks: Ethernet

advertisement
LANs
1
Local Area Networks: Ethernet
Prof. Jean-Yves Le Boudec
Prof. Andrzej Duda
Prof. Patrick Thiran
ICA, EPFL
CH-1015 Ecublens
Patrick.Thiran@epfl.ch
http://icawww.epfl.ch
LANs
2
Objective
o Understand shared medium access methods of Ethernet;
o Describe network aspects of an Ethernet network;
PART A: The CSMA/CD method
PART B: Network Aspects (Ethernet)
PART C: CSMA/CA and wireless LANs
The access method is a way of sharing a common transmission medium (cable,
wireless link) between several hosts. Ethernet is built upon the medium access
method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection).
The network aspects explain how a local area network is built today. We will
see that the resulting network is very far away from the original design.
LANs
3
Part A:
Motivation for LANs
o goal: connect computers in same site (building, small campus)
o experience from host centric networks:bursty traffic
o basic idea: share a cable, no complex software in the end systems
o alternatives ?
switch based LANs: connection oriented: ATM
switch based LANs: connectionless. Switched Ethernet
If you want to understand something in the world of local area networks, you
should keep in mind the design requirements. Today, they are:
•(1) interconnect many pieces of equipment without complex cabling, inside a
limited geographical area, and inside one organization
•(2a) be easy to manage, in particular, detect cable faults easily.
When Ethernet was first conceived, the requirements were a little bit
different. The second requirement was replaced by:
•(2b) use one shared cable for the entire network.
Today most people would agree that this is not necessarily a good idea,
because fault isolation is difficult on a shared cable. Originally, it was
believed to be good because it would reduce the amount of cabling, and because
traffic is bursty.
Burstiness means that, most of the time, sources are idle; once in a while,
they send a large amount of traffic. The response time is better with a shared
medium system than if you allocate a fixed share to all (see exercise).
LANs
4
Access Method
o multiaccess communication = share a communication medium
o examples
radio channel, cellular networks, satellite links
machine bus
local area cable
o multiaccess communication (= shared medium) requires an Access Method
deterministic:
Time Division Multiple Access (TDMA)
Token Passing (Token Ring, Token Bus, FDDI)
DQDB
non-deterministic
Aloha
CSMA/CD
CSMA/CA
• The purpose of the access method is to control access to the channel. If all
stations talk at the same time, then no data can be understood by receivers
(collision). Compare to a CB channel.
• Deterministic access method require that stations talk only when they are
authorized by the access protocol. With TDMA, time is divided into periodic
slots; station i can use time intervals [(i-1)δ, iδ), [T+(i-1)δ, T+ iδ),
, [2T+(i-1)δ, 2T +iδ), …, where T is the period and δ the slot duration. With
n stations, only 1/n of the channel time is usable by one station. The scheme
requires global synchronization; it does not support bursty traffic well (why
?), however it is simple to control. It is used in cellular and satellite
systems.
With a token passing schemes, there exists one global token that circulates
among stations; in order to talk, a station must have the token; while
talking, the token is kept by the station, which has to release it after a
maximum token holding time. Token passing schemes allow a very high
utilization even with sporadic traffic, as long as the bandwidth delay product
is not too large (time is wasted while passing token from one station to the
other).
DQDB uses two buses on which endpoints generate trains of cells. To use a
cell, a station must position a reservation bit in a cell on the opposite bus
and use one of the empty cells going to the destination station.
• Non deterministic (=collision based) schemes take an optimistic approach.
Collisions are avoided if possible, but they may occur, and the schemes
operate in such a way that they can be recovered from. Aloha is a primitive
scheme which evolved to CSMA/CD, the access method of Ethernet. These schemes
are simpler to implement than token passing schemes, but do not support as
high utilization (time is wasted during collisions and during collision
recovery times). Collision based schemes do not work well if the bandwidth
delay product is high. A modified version is used in a wireless LAN such as
WaveLAN: CSMA/CA (Collision Avoidance). In order to limit collisions, stations
backoff a random interval before each transmission.
LANs
5
Access Method Topology
o Logical Topology:
l
bus:
–
–
–
–
l
all bits sent by one station are propagated to all stations
data die at the end of bus (terminators)
all stations see all frames (broadcast medium)
used by Ethernet, Token Bus, LocalTalk, Wireless LANs
ring:
–
–
–
–
all bits pass from one station to the next one, then to its neighbour, etc
bits eventually return to the originating station that has to remove them
all stations see all frames
used by Token Ring and FDDI
o cabling topology = layout of cables = star in most cases
l
ring topology can be formed from the star layout of cables
CSMA/CD uses the bus logical topology, whereas token passing schemes such as
Token Ring and FDDI use ring topologies.
The cabling topology is in general different from the logical topology. A
simple network today uses a star topology: all cables go from a central point
(the hub) to all end-systems. A more complex network uses a tree of stars.
It is the Token Ring network that first introduced a star based cabling
topology; this because the designers of the Token Ring took requirement (2b)
seriously. With the first Token Rings, cables from a station go to a hub
containing electro-magnetic relays that would automatically bypass a station
not correctly functioning (or powered off).
LANs
6
ALOHA
data
central
host
ack
transmission procedure
ii == 11
while
while (i
(i <=
<= maxAttempts)
maxAttempts) do
do
send
packet
send packet
wait
wait for
for acknowledgement
acknowledgement or
or timeout
timeout
if
if ack
ack received
received then
then leave
leave
wait
wait for
for random
random time
time
increment
i
increment i
end
end do
do
• ALOHA is the basis of all non-deterministic access methods. The ALOHA
protocol was originally developed for communication between islands
(University of Hawaï) using radio channels at low bit rates.
• The ALOHA protocol requires acknowledgements and timers.
Collisions occur, and if a packet is lost, then source has to retransmit; the
retransmission strategy is not specified here; many possibilities exist. We
will see the one used for CSMA/CD.
• There is no feedback to the source in case of collision (was too complex to
implement at that time). The picture shows a radio transmission scenario;
Aloha can also be used on a cable (bus).
•The maximum utilization can be proven to be 18% (see below). This is assuming
an ideal retransmission policy that avoids unnecessary repetitions of
collisions.
LANs
7
Throughput of Aloha
o Assumptions
l
Frames of same length, take T time units to be successfully transmitted between any two nodes;
Infinite number of stations;
Fresh traffic arrival process is Poisson (λ);
Fresh arrival traffic always attempts to go through upon arrival;
Backlogged stations retransmit independently from each other and from the arrival process, waiting a
random time τ exponentially distributed, with mean 1/v, between consecutive attemps
l
l
l
l
o Number of generated frames is therefore a Poisson process of rate g(n) = (λ + nv) for n
backlogged stations
o P(a packet is transmitted | n backlogged stations) = P(no collision | n backlogged stations) =
P(no packets generated during 2 T | n backlogged stations) = exp (-2Tg(n))
o Average throughput when there are n backlogged stations is θ(n) = g(n)T exp (-2Tg(n))
o θ(n) has maximum equal to 1/2e for gT=0.5
θ
gT
• The maximum utilization is difficult to obtain and depends on a large number
of parameters. We provide an upper bound.
• We observe packet arrivals at one point on the medium. We assume that packet
arrivals (fresh + retransmissions) are Poisson, and call µ the parameter. This
assumption is not obvious. It has been shown to be valid if fresh traffic is
Poisson, and if the retransmission policy is optimal. Other retransmission
policies lead to worse utilizations, or even to unstable systems.
• We assume that packet transmission time is constant, equal to T.
• Consider a packet arriving at time t. The packet will be transmitted without
collision iff no other packet arrives during time interval [t-T, t+T]. The
probability of this to happen is exp(-2µT).
• Over a long time interval s, the total number of packet arrivals is close to
µs, the fraction of packets transmitted without collision is close to exp(2µT), therefore the maximum utilization is :
µs exp(-2µT)T / s = µT exp(-2µT)
• µ is unknown and depends on the retransmission policy. However we can
compute the maximum value of the utilization over all possible values of µ.
The function is maximum for 2µT =1, and the value of the maximum is 1/2e = ca.
0.18.
LANs
8
Detailed Analysis : Slotted Aloha
o The analysis is simpler for slotted ALOHA.
o Assumptions
l
l
l
l
l
Transmissions are synchronized to start at the beginning of a time slot and last for exactly one
time slot. Let T denote its length;
Number of stations is m;
Fresh arrival with probability qa per unbacklogged station, 0 otherwise. Assuming total fresh
arrival traffic for the m stations is Poisson(λ), one has thus qa = 1 - exp(- λT/m);
Fresh arrival traffic always attempts to go through upon arrival;
Backlogged stations retransmit independently from each other wit h probability qr at each slot;
o Let X(t) denote the number of backlogged stations at the end of the tth time slot
o X(t) is a Markov chain (exercise).
In this and the following slides we do a more detailed analysis.
The analysis is considerably simpler for slotted Aloha, which we assume in the
rest of this chapter.
LANs
9
Detailed Analysis : Slotted Aloha
o Define
l
l
l
l
A(n) = number of fresh arrivals during the tth time slot knowing that X(t-1) = n. Then
m − n  i
m − n −i
P( A( n) = i) = 
q a (1− qa )
E[ A(n)] = ( m − n)qa
i


B(n) = number of attempts from the backlogged stations to retransmit during the tth time slot
knowing that X(t-1) = n.Then
 n
n −i
P (B (n) = i ) =  q ir (1 − q r )
E[ B(n)] = nqr
i
 
G(n) = A(n) + B(n) = total number of frames generated during the tth slot when X(t-1) = n.
g(n) = E[G(n)] = average frame generating rate during the tth slot when X(t-1) = n.
g (n) = E[G (n)] = (m − n)qa + nqr
l
Θ(n) = number of frames successfully transmitted during the tth slot knowing that X(t-1) = n
P(T (n) = 1) = P ( A(n) = 1)P (B (n) = 0) + P( A(n) = 0)P (B (n) = 1)
( ) (1− q ) + nq (1− q ) (1 − q )
≈ (m − n) q (1 − q ) (1 − q ) + nq (1 − q ) (1− q )
= (m − n ) q a 1 − q a
m− n −1
m− n
a
l
a
m− n
n
r
r
m− n
n
r
n −1
r
a
r
a
n
r
≈ g (n) exp (− g (n))
θ(n) = E[Θ(n)] = P(Θ(n)=1) average throughput during the tth slot when X(t-1) = n.
In this and the following slides we do a more detailed analysis.
The analysis is considerably simpler for slotted Aloha, which we assume in the
rest of this chapter.
LANs
10
Numerical Examples
oThroughput is thus approximately θ = g exp(-g)
oThe maximum utilization is bounded by 1/e ≈ 0.36
θ
θ
g
g
m = 10 stations
m = 50 stations
o The figure illustrates that the relation throughput ≈ g exp(-g) holds well for large m
The figure shows results of the Markov chain analysis.
We have considered a number of possible values for the parameters m, qa and
qr. For a given value of m, we vary qa and q r as explained above. Every value
of (m, qa, qr) gives one point on one curve. A point is defined by
x = G = offered load
y = achieved throughput
The dots represent the exact values for our model. The curve is the ideal
relation y = x exp(-x).
LANs
11
ALOHA Instability
o Define D(n) = E[A(n)] - θ(n) = (m-n)qa – g(n)exp(-g(n)) as the “drift” in the
system
l D(n) > 0 ⇒ More arrivals than departures, on the average
l D(n) < 0 ⇒ Fewer arrivals than departures, on the average
l D(n) = 0 ⇒ Equilibrium
oFor m = ∞ all states of the Markov chain are transient
θ(n)
g(n)exp(-g(n))
( m − n ) qa
mq a
g (n) = ( m − n)qa + nqr
mqr
LANs
12
CSMA
o Improvement 1: Listen before you talk: ”Carrier Sense Multiple Access“
ii == 11
while
while (i
(i ≤≤ maxAttempts)
maxAttempts) do
do
listen
listen until
until channel
channel idle
idle
transmit
transmit immediately
immediately
wait
wait for
for acknowledgement
acknowledgement or
or timeout
timeout
if
ack
received
then
leave
if ack received then leave
wait
wait random
random time
time /*
/* collision*/
collision*/
increment
increment ii
end
end do
do
CSMA improves on Aloha by requiring that stations listen before transmitting
(compare to CB radio).
Some collisions can be avoided, but not completely. This is because of
propagation delays. Two or more stations may sense that the medium (= the
channel) is free and start transmitting at time instants that are close enough
for a collision to occur. Assume propagation time between A and B is 2 ms and
that all stations are silent until time 0. At time 0, station A starts
transmitting for 10 ms, at time 1 ms, station B has not received any signal
from A yet, so it can start transmitting. At time 2ms, station B senses the
collision but it is too late according to the protocol.
The CSMA protocol requires that stations be able to monitor whether the
channel is idle or busy (no requirements to detect collisions). It is a simple
improvement to Aloha, at the expense of implementing the monitoring hardware.
The effect of the CSMA protocol can be expressed in the following way. Call T
the maximum propagation time from station A to any other stations; if no
collision occurs during a time interval of duration T after A started
transmitting, then A has seized the channel (no other station can send).
CSMA works well only if the transmission time is much larger than propagation,
namely bandwidth-delay product << frame size. It has the same stability
problems as Aloha.
In order to avoid repeated collisions, it is required to wait for a random
delay before re-transmitting. If all stations choose the random delays
independently, and if the value of the delay has good chances of being larger
than T, then there is a high probability that only one of the re-transmitting
stations seizes the channel.
LANs
13
CSMA/CD
o improvement 2: detect collisions as soon as they occur :
“Carrier Sense Multiple Access / Collision Detection”
o improvement 3: acknowledgments replaced by CD
ii == 11
while
while (i
(i <=
<= maxAttempts)
maxAttempts) do
do
listen
listen until
until channel
channel is
is idle
idle
transmit
transmit and
and listen
listen
wait
wait until
until (end
(end of
of transmission)
transmission) or
or (collision
(collision detected)
detected)
if
collision
detected
then
if collision detected then
stop
stop transmitting
transmitting /*
/* after
after 32
32 bits
bits (“jam”)*/
(“jam”)*/
else
else
wait
wait for
for interframe
interframe delay
delay
leave
leave
wait
wait random
random time
time
increment
increment ii
end
end do
do
o This is Ethernet (- 802.3, the standard conformant version of Ethernet)
CSMA/CD is the protocol used by Ethernet. In addition to CSMA, it requires
that a sending station monitors the channel and detects a collision.
The benefit is that a collision is detected within a propagation round trip
time.
Collisions may still occur.
LANs
14
CSMA/CD Time Diagram 1
o A senses idle channel, starts
transmitting
0
o shortly before T, B senses T
idle channel, starts
transmitting
A
B
LANs
15
CSMA / CD Time Diagram 2
o A senses collision,
continues to transmit 32
bits (“jam”)
o B senses collision,
continues to transmit 32
bits (”jam“)
A
B
0
T
Jam bits are simply there to make sure the collision is long enough to be
detected by the hardware.
LANs
16
CSMA / CD Time Diagram 3
o A waits random time t1
o B waits random time t2
o B senses channel idle and
transmits
o A senses channel busy
and defers to B
o A now waits until
channel is idle
A
B
0
T
t2
t1
• CSMA/CD improves on CSMA by requiring that stations detect collisions and
stop transmitting (after 32 bits, called jam bits, in order to ensure that all
circuits properly recognize the presence of collisions).
• CSMA/CD has better performance than Aloha or CSMA, but suffers from the same
stability problems
• After a collision is detected, stations will re-attempt to transmit after a
random time.
• Acknowledgements are not necessary because absence of collision means that
the frame could be transmitted (see ”Minimum Frame Size“).
• The interframe delay (“gap”) is 9.6 µs. It is used to avoid blind times,
during which adapters are filtering typical noise at transmission ends.
• The random time before retransmission is chosen in such a way that if
repeated collisions occur, then the time increases exponentially. The effect
is that in case of congestion (too many collisions) the access to the channel
is slowed down.
LANs
17
Exponential Backoff
o random time before re-transmission is given by:
kk == min
min (10,
(10, AttemptNb)
AttemptNb)
k
rr == random
random (0,
(0, 22k -1)
-1) ** slotTime
slotTime
“AttemptNb” is the number of the re-transmission attempt that will be
attempted after the random time (k=1 for the first retransmission);
“random” returns an integer, uniformly distributed between the two
bounds given in argument;
o examples:
first retransmission attempt:
k = 1; r = 0 or r = slotTime
second retransmission attempt (if preceding one failed):
k = 2; r = 0, 1, 2 or 3 * slotTime
o when AttemptNb = 15, then abort transmission
LANs
18
Minimum Frame Size
A
B
A
B
A
B
A
B
t = 0: A begins transmission
t = 1- ε: B begins transmission
t = 1 : B detects collision, stops
transmitting
t = 2- ε: A detects collision
LANs
19
Minimum Frame Size
o a minimum frame size equal to number of bits transmitted during one round trip is
required to detect all collisions
o slotSize = number of bits transmitted by a source during the maximum round trip
time for any Ethernet network
l
l
l
slotSize= bandwidth - delay product + jam size + safety margin
= 512 bits at 10 and 100 Mb/s, = 512 bytes at 1 Gb/s
slotTime = slotSize / 10Mb/s = 51.2 µs
o rule: in Ethernet, all frames must be as large as slotSize
l
the minimum data field: 46 bytes
o properties:
P1: all collisions are detected by sources while transmitting
P2: collided frames are shorter than slotSize
Proof:
P1 see previous slide
P2 because collided frame are aborted by source at the latest after slotTime, including jam bits
LANs
20
CSMA / CD performance
o Maximum utilization of Ethernet is difficult to determine analytically.
l
Approximation:
θ ≈
1/(1+ Cα)
where α = β / L = 2Db / bT = 2D/T
l
L = frame size, β = bandwidth-delay product, D = propagation delay, T = transmission time
l
of a frame of size L, b = bit rate of the channel.
C is a constant : C = 3.1 is a pessimistic value; C = 2.5 is an approximate value based on
simulations
o for a large network, β is close to 60 Bytes; for traffic with small frames (L = 64 bytes),
the utilization is less than 30 %. For large frames (1500 Bytes), it is around 90%.
o Key for high utilization is: bandwidth delay product << frame size
The formula with C= 3.1 is proven in the next slide. It is a pessimistic
estimate.
LANs
21
Proof
o Assumptions
l
l
l
l
l
l
Frames of same length, take T time units to be transmitted between any two nodes;
Maximal propagation delay D = αT/2 (worst case assumption: arrivals are always at alternate ends of the
network, namely, separated by the maximum propagation delay);
Infinite number of stations;
Fresh traffic arrival process is Poisson (λ);
Fresh arrival traffic always attempts to go through upon arrival;
Backlogged stations retransmit independently from each other and from the arrival process, waiting a
random time τ exponentially distributed, with mean 1/v, between consecutive attempts
o Number of frames is therefore a Poisson process of rate g(n) = (λ + nv) for n backlogged stations
o P(a generated packet is transmitted | n backlogged stations) = P(no collision | n backlogged
stations) = P(no packets generated during D | n backlogged stations) = exp (-Dg(n))
o T cyc = E[Cycle time starting from a successful or aborted transmission | n backlogged stations] =
D + E[Time until next frame generated] +
E[Time until transmission completes|success] P(successful transmission | n backlogged stations) +
E[Time until transmission aborted|collision] P(collision | n backlogged stations)
= T + 1/g(n) + T exp (-Dg(n)) + 2D (1 - exp (-Dg(n)))
o Average throughput when there are n backlogged stations is θ(n) = Tusefu l/Tcyc= T exp (-Dg(n))/Tcyc
o θ(n) has maximum for gD = 0.43, from which we get the formula
LANs
22
Part B: Ethernet / IEEE 802.3
o Ethernet =
CSMA/CD with exponential backoff
as shown in part A
originally over a coaxial cable
10 Mb/s to 1 Gb/s
local area only (<= 0.2 to 2 kms )
o Ethernet history
1980 : Ethernet V1.0 (Digital, Intel,
Xerox)
1982 : Ethernet V2.0
1985 : IEEE 802.3 standard
small differences in both specifications;
adapters today support both
1995 : IEEE 802.3 100Mb/s standard
802.3 frame
preamble
Ethernet V.2 frame
7 B
preamble
SFD
1 B =
10101011
DA
6 B
DA
SA
6 B
SA
Length
2 B
Type
NSAP
data
SFD
[46,1500]B
data
pad
FCS
4 B
FCS
DA = destination address
SA = source address
The preamble is used for the receivers to synchronize (01010101… terminated by
0). With Ethernet, transmission starts asynchronously (stations start
independently), and between transmissions, the channel is idle.
SFD (start frame delimiter) is used to validate the beginning of a frame.
Destination length is used to indicate the total length before padding.
Padding is required if the minimum frame size of 512 bits = 64 bytes is not
reached. With the Ethernet proprietary (=non standard) format, this field is
not present. It is up to the layer using Ethernet to know that frames have to
be at least 512 bits, and perform the padding. Maximum size of data part is
1500 Bytes (limitation imposed by buffer size considerations in adapters).
The type field indicates the type of upper layer that uses the protocol (for
example: IP or Appletalk). With 802.3, either the field length indicates the
type user instead of the frame length, either this field is absent. It is
replaced by an intermediate layer, called LLC that provides mainly this
multiplexing function. LLC is not needed with the non-standard Ethernet. Type
values are larger than the maximum size so both formats can exist on the same
network (even on the same station).
The FCS (frame check sequence) is a 32-bit cyclic redundancy check. It can
detect all single, double, triple errors, all error bursts of length <= 32, most double
bursts of length up to 17. The probability that a random collection of bit errors is
undetected is 2e-10.
Ethernet works for a local area only. This is because the CSMA/CD protocol has
poor utilization as the bandwidth-delay product becomes large compared to the
frame sizes.
LANs
23
Ethernet v2 / IEEE 802.3
o Data link layer divided in 2 sublayers:
o Medium Access Control
(MAC):
l
l
Manages access to the physical
layer
Independent of physical layer
o Logical Link Control (LLC):
l
l
l
IEEE/802.3 frame
Network
Network Layer
Layer
}
LLC
LLC Sub-Layer
Sub-Layer
MAC
MAC Sub-Layer
Sub-Layer
Data
Data link
link Layer
Layer
preamble
Physical
Physical Layer
Layer
Identifies protocol user
destination in the header
Error , flow control possible
Independent of MAC sub-layer
SFD
DA
SA
Length
LLC Type
data
data
NSAP(LLC)
data
pad
FCS
Network Layer
LLC Sub-Layer MAC Sub-Layer
LANs
24
Addressing
o MAC address: 48 bits (6 bytes) = adapter name
o MAC addresses are provided by manufacturer.
l
Examples. CISCO: 00:00:0C:::,
3COM: 02:60:8C:::
o sender puts destination MAC address in the frame
o all stations read all frames; keep only if destination address matches
o all 1 address (FF:FF:FF:FF:FF:FF ) = broadcast
MAC address A
08:00:20:71:0d:d4
B
C
D
00:00:c0:3f:6c:a4
01:00:5e:02:a6:cf (group address)
• Ethernet addresses are known as MAC addresses. Every Ethernet interface has
its own MAC address, which is in fact the serial number of the adapter, put by
the manufacturer.
MAC addresses are 48 bit-long. The 1st address bit is the individual/group
bit, used to differentiate normal addresses from group addresses. The second
bit indicates whether the address is globally administered (the normal case,
burnt-in) or locally administered. Group addresses are always locally
administered.
• When A sends a data frame to B, A creates a MAC frame with source addr = A,
dest addr = B. The frame is sent on the network and recognized by the
destination.
• Some systems like DEC networks require that MAC addresses be configured by
software; those are so-called locally administered MAC addresses. This is
avoided whenever possible in order to simplify network management.
• Data on Ethernet is transmitted least significant bit of first octet first
(a bug dictated by Intel processors). Canonical representation thus inverts
the order of bits inside a byte(the first bit of the address is the least
significant bit of the first byte); examples of addresses:
01:00:5e:02:a6:cf
08:00:20:71:0d:d4
00:00:c0:3f:6c:a4
00:00:0c:02:78:36
FF:FF:FF:FF:FF:FF
(a group address)
(a SUN machine)
(a PC )
(a CISCO router)
the broadcast address
LANs
25
Ethernet Cabling
o Ethernet cabling is originally shared cable
o Today: mainly point to point UTP - twisted pair
o How is that possible ?
l
l
Thick Coax
repeaters
bridges
Thin Coax
UTP
Contrary to the original design requirement, Ethernet cabling is today mainly
point to point.
Why do network managers prefer point to point cabling?
- because fault isolation is simpler
- because configuration management is simpler
How is point to point cabling possible with a shared medium protocol?
- using repeaters (shown on the next slide)
- or using bridges (called Ethernet Switches)
LANs
26
Repeaters
o Extend network beyond cable length
limit
o Function of a simple, 2 port repeater:
- repeat bits received on one port to
other port
- if collision sensed on one port,
repeat random bits on other port
o One network with repeaters = one
collision domain
o Even with repeaters, network is
limited
l
l
l
Repeater
propagation time
51.2µs slotTime includes repeaters
at most 4 repeaters in one path
o Repeaters perform only physical
layer functions (bit repeaters)
From ethernet.faq:
There are limitations on the number of repeaters and cable segments
allowed between any two stations on the network. There are two different ways of
looking at the same rules:
1. The Ethernet way: A remote repeater pair (with an intermediate point-topoint link) is counted as a single repeater (IEEE calls it two repeaters). You
cannot put any stations on the point to point link (by definition!), and there can be
two repeaters in the path between any pair of stations.
This seems simpler to me
than the IEEE terminology, and is equivalent.
2. The IEEE way: There may be no more than five (5) repeated segments, nor
more than four (4) repeaters between any two Ethernet stations; and of the five cable
segments, only three (3) may be populated. This is referred to as the "5-4-3"
rule (5 segments, 4 repeaters, 3 populated segments).
From 3Com, for 10 Mb/s Ethernet:
The 100BASE-T standard defines two classes of repeaters, called Class I and Class II
repeaters. A collision domain can include at most one Class I or two Class II repeaters.
Key topology rules are as follows:
• Using two Class II repeaters, the maximum diameter of the collision domain is 205
meters (typically 100m + 5m + 100m). With just a single Class II repeater in the
collision domain, the diameter can be extended to 309 meters using fiber (typically
100m UTP + 209m fiber downlink). With a single Class I repeater in the collision
domain, the diameter can be extended to 261 meters using fiber (typically 100m UTP +
161m fiber downlink).
• Connecting from MAC to MAC (switch to switch, or end-station to switch) using halfduplex 100BASE-FX, a 412-meter fiber run is allowed.
• For very long distance runs, a nonstandard, full-duplex version of 100BASE-FX can be
used to connect two devices over a 2-kilometer distance. The IEEE is currently working
on a standard for full duplex, but at this time all full-duplex solutions are
proprietary.
LANs
27
From Repeaters to Hubs
o Multiport repeater (n ports)
logically equivalent to:
- n simple repeaters
- connected to one internal
Ethernet segment
o Multi-port repeaters make it possible to
use point-to-point segments (Ethernet in
the box)
o Value of point to point cabling ?
- ease of management
- fault isolation
Multiport
Repeater
Ethernet Hub
S1
S2
Multiport
ReUTP segment peater
S3
to other hub
Repeaters are the first building block that made it possible to have point-topoint star based cabling.
LANs
28
From Bus to Star and Tree
o Ethernet today = active
concentrators allow star wiring
fiber
o UTP on point-to-point
configurations only
Intermediate
o remote network management
Hub
NMA
o How many frames can be
transmitted in parallel in this UTP
network ? ______
Head
hub
NMA
coax
console
Intermediate
Hub
NMA
coax
Intermediate
Hub
NMA
NM Application
transceiver
cable
The figure shows the “tree of stars topology” which is now typical for a large
shared medium Ethernet.
However, we see on the next slides that large shared medium Ethernet are not
common anymore, due to the introduction of switching or bridging.
LANs
29
Bridges
port 1
port 3
Bridge
A
C
Forwarding Table
MAC
MAC Port
Port
addr
addr nbr
nbr
port 2
Repeater
B
D
AA
BB
CC
DD
11
22
33
22
o Bridges are intermediate systems, or switches, that forward MAC frames to
destinations based on MAC addresses
o Bridges perform connectionless data forwarding
o Bridges separate collision domains
l
l
a bridged LAN maybe much larger than a repeated LAN
there may be several frames transmitted in parallel in a bridged LAN
A bridge is an intermediate system for the MAC layer. It receives MAC frames
and forwards them further.
LANs
30
Repeaters and Bridges in OSI Model
Application
5 to 7 Presentation
Session
4
Transport
3
Network
2
1
LLC
Application
Presentation
Session
5 to 7
Transport
L2 PDU
(MAC Frame)
MAC
Physical
End System
L2 PDU
(MAC Frame)
Network
4
LLC
3
MAC
MAC
2
Physical
Physical
Physical
1
Repeater
Bridge
End System
o Bridges are layer 2 intermediate systems
o Repeaters are in layer 1 intermediate systems
o There also exist layer 3 intermediate systems (IP routers) -> see next chapter
LANs
31
Bridge learning
o Bridges build their forwarding tables by themselves (plug-and-play devices :
management very easy). They are called transparent bridges.
o Initially: empty table
port 1
A
Bridge
port 3
C
port 2
Repeater
B
D
Forwarding Table
MAC
MAC Port
Port
Addr
Addr Nbr
Nbr
LANs
32
Bridge learning (2)
o Frame arrives at one of the ports, destination not in the forwarding table : bridge
forwards copies of the frame to all its other ports
o Bridge stores
l
l
l
the source number of the incoming frame
the port from which the frame arrived
the current time
port 1
A
Bridge
port 3
C
port 2
Repeater
AA
B
D
Forwarding Table
MAC
MAC Port
Port Time
Time
addr
addr Nb
Nb
11
10:37
10:37
LANs
33
Bridge learning (3)
o Frame arrives at one of the ports, destination address is in the forwarding table :
bridge forwards copies of the frame only to the port
o Bridge stores
l
l
l
the source number of the incoming frame
the port from which the frame arrived
the current time
port 1
A
Bridge
port 3
C
port 2
Repeater
AA
BB
B
D
Forwarding Table
MAC
MAC Port
Port Time
Time
addr
addr Nb
Nb
11
22
10:37
10:37
10:43
10:43
LANs
34
Bridge learning (4)
o No frame arrived from a particular source after some period of time (the aging
time): this address is purged from the table.
port 1
A
Bridge
port 2
Repeater
D
port 3
C
Forwarding Table
MAC
MAC Port
Port Time
Time
addr
addr Nb
Nb
AA
11
11:45
11:45
LANs
35
Spanning tree
o Works well as long as there is no loops.
o If there is a loop: learning will cause a broadcast storm.
o Bridges need to run a spanning tree algorithm first. The spanning tree will keep all
the nodes reahable by disabling some ports of some bridges to prevent loops.
o Why is it useful to have loops in the connection of different LA Ns ?
port 1
Br A
Connected
port
C
port 3
Blocked
port
A
port 2
Repeater
port 2
B
port 3
Br B
D
port 1
E
LANs
36
Switched Ethernet
o
o
o
o
Switched Ethernet = Bridge in the box
Total bandwidth is not shared: parallel frame transmission
An Ethernet Switch = Multiport Bridge is a connectionless data switch
Ethernet used as a point-to-point mechanism!
Frame Switching Hub
B1
1
A
2
B
Frame Switching Hub
Bridge
3
C
4
B2 Bridge
1 2
5
D
U
3
V
4
W
5
X
LANs
37
Today’s Concentrators
concentrators (=hub) combine frame switching and port switching
o frame switching = bridging
o port switching = assign repeater ports to collision domains
How many Ethernet segments (=collision domains) on the picture ?
Frame Switching Hub
Frame Switching Hub
Bridge
B1
B2
Bridge
3a
1
A
2
B
3
C
4
1
5
D
U
2
3
V
4
W
5
repeater
X
LAN concentrators perform both bridging and repeating. They can be configured
by a network management application.
LANs
38
Today’s Concentrators
concentrators (=hub) combine frame switching and port switching
o frame switching = bridging
o port switching = assign repeater ports to collision domains
example: ports 3 and 4 at H2 are on one Ethernet segment
Frame Switching Hub
Bridge
B1
Frame Switching Hub
H1
B2
H2
Bridge
3a
1
A
2
B
3
C
4
1
5
D
U
2
3
V
4
W
5
repeater
X
LANs
39
Today’s Concentrators
concentrators (=hub) combine frame switching and port switching
o frame switching = bridging
o port switching = assign repeater ports to collision domains
example: port 5 is switched to same Ethernet segment as 3 and 4
Frame Switching Hub
H1
Bridge
B1
Frame Switching Hub
B2
H2
Bridge
3a
1
A
2
B
3
C
4
1
5
D
U
2
3
V
4
W
5
repeater
X
LANs
40
Virtual LANs
o several bridged LANs consolidated on one physical layer
o uses ATM or proprietary methods
A
B
C
X1
X2
Virtual
LAN
Concentrator
Virtual
LAN
Concentrator
D
L
M
N
P
Virtual
LAN
Concentrator
U
X3
V
The picture shows two virtual LANs: (ACLNV) and (BDMPU). For each of the virtual
LANs, there exists one or more collision domains per concentrator, plus one per
inter-concentrator link. The concentrators perform bridging between the
different collision domains of the same virtual LAN.
Between X1 and X2, the two virtual LANs use the same physical link. If ATM is
used, there is one VCC per virtual LAN.
The advantage is that physical location becomes independent of LANs. For
example, all servers and routers can be concentrated in the same rooms (ex: U
and V)
There is no communication between the different virtual LANs at layer 2.
LANs
41
Full duplex Ethernet
o A shared medium Ethernet cable is half duplex
o Full duplex Ethernet = a point to point cable, used in both directions
l
no access method, no CSMA/CD
o 100 Mb/s and Gigabit Ethernet switches use full duplex links to avoid distance
limitations and to guarantee bandwidth for stations
LANs
42
Congestion Control
o A network of buffers require some form of congestion
control
P0
l
otherwise congestion collapse may occur
o Known forms of congestion control are
l
l
l
reservations (ex: ATM)
end-to-end (ex: TCP)
hop by hop (ex: machine bus)
P1
P2
P3
P=0
P=1
P=2
STOP
P=3
P=4
STOP
o Ethernet concentrators use hop-by-hop flow control
l
l
STOP signal can be simulated by collisions on half
duplex links
on full duplex links: PAUSE ( n ) frames, where n is the
duration of required stopping time
GO
P=5
P=6
P=7
LANs
43
Architecture versus Products
o architecture = set of protocols and functions
defined by standards or proprietary specifications (SNA, Decnet, AppleTalk)
examples:
MAC layer, Ethernet Physical Layer
Bridge, Repeater
o Products = implementations of various architecture components
examples:
a concentrator that performs repeating, bridging
an adapter that performs MAC + PHY
frame switching performed
store and forward
cut through
Bridging is a well defined architecture concept. Switching is a commercial
name with different meanings depending on the context. In a LAN context, a
switching Ethernet concentrator is simply a bridge.
LANs
44
Part C: CSMA/CA / IEEE 802.11
o Wireless LANs IEEE 802.11 architecture
l
l
l
l
l
Basic block = BSS (Basic Service Set)
All stations within a BSS share the same
medium
No central control, no connections to the
outside world: ad-hoc network
With a central control, connection to the
outside world: base station = AP (Access
Point)
Multiple APs are interconnected by a
distribution system (DS) to form an
ESS (Extended Service Set)
BSS
BSS
BSS
AP
AP
DS
IEEE 802.11 is the standardized protocol for wireless LANs. Nodes can be fixed
or mobile: it supports mobility, handover
Bit Rate: 1 to 2 Mbps. Much less than in any Ethernet !
LANs
45
Why not just wireless Ethernet ?
o Problems with CSMA/CD:
l
l
l
l
Difficult for the transmitting station to
detect collision in a radio environment,
and therefore to abort due to collision
Even if transmitter detects collision, it
can be hidden by physical obstruction
from other stations, which can not detect
its transmission. A collision may then
occur at the receiver.
Fading can cause the same problem as a
hidden terminal. Time and space varying.
Transmissions by users in other LANs
can interfere with CSMA/CD operations.
LANs
46
o Source:
CSMA/CA (DCF)
ii == 11
while
while (i
(i <=
<= maxAttempts)
maxAttempts) do
do
set
set frame
frame duration
duration length
length in
in duration
duration field
field
listen
until
(channel
is
idle
listen until (channel is idle ++ DIFS)
DIFS)
transmit
transmit
wait
wait for
for acknowledgement
acknowledgement or
or timeout
timeout
if
ack
received
then
leave
if ack received then leave
wait
wait random
random time
time /*
/* collision*/
collision*/
increment
increment ii
end
end do
do
o Destination:
if
if data
data received
received then
then
wait
wait SIFS
SIFS /*
/* SIFS
SIFS << DIFS
DIFS */
*/
send
send ack
ack
end
end if
if
o Others: add virtual CSMA to physical CSMA:
if
if data
data heard
heard then
then
set
set NAV
NAV == frame
frame duration
duration ++ SIFS
SIFS ++ Ack
Ack duration
duration
defer
defer access
access until
until now
now ++ NAV
NAV
end
end if
if
The first network of Apple (Appletalk) was CSMA/CA (collision avoidance) at
230.4 kb/s.
The mode of CSMA/CA described here is valid for the Distributed Coordination
Function (DCF), which is the contention (best-effort) service always
implemented in IEEE 802.11. The contention-free service, called Point
Coordination Function (PCF), is optional.
SIFS = Short Interframe Space
DIFS = Distributed Interframe Space
CS (carrier sensing) is done at the physical and MAC layers:
Physical CS is performed by stations at the air interface, by analyzing the
presence of all detected packets and relative strength of signals from other
sources.
Virtual CS is used at by a source station to inform all stations (except maybe
those hidden to the source) inside a BSS the time during which the channel
will be busy. The frame duration of the source is set in a field contained in
the header. The stations adjust their NAV (Network Allocation Vector), which
indicate the amount of time that will elapse before the current transmission
is complete.
LANs
47
CSMA / CA (1)
A (source) B (destination) others
DIFS
Data
SIFS
NAV
o Because SIFS < DIFS,
acks have priority over
data packets
o NAV does not solve
completely the hidden
terminal (and fading)
problems
o Retransmissions use
exponential backoff
ACK
The NAV is helpful for stations hidden from the receiver, but not from the
transmitter.
LANs
48
CSMA / CA (2)
l
l
A (source) B (destination)
DIFS
RTS
RTS (Request-to-send)
CTS (Clear-to-send)
o CTS reserves the channel to the
source for the duration
indicated in duration field.
o Collisions can only occur
during the short RTS and CTS
o All stations in the range of A
adjust their NAV thanks to
duration field indicated in RTS.
o All stations in the range of B
adjust their NAV thanks to
duration field indicated in CTS.
o Stations can choose to use
CTS/RTS or not.
others
SIFS
CTS
DIFS
Data
SIFS
ACK
NAV (RTS)
NAV (CTS)
o To solve the hidden terminal
problem, use a handshake
procedure:
LANs
49
Facts to Remember
o
o
o
o
o
o
o
o
o
Computers communicate in a local area network using Ethernet and MAC addresses
A MAC address is the serial number of the Ethernet adapter
Original Ethernet is a shared medium: one collision domain per LAN
Using bridging we can have several collision domains per LAN
An Ethernet switch uses bridging
Repeaters are bit-forwarding devices inside one Ethernet segment
Bridges are connectionless intermediate systems that separate Ethernet segments
IEEE 802.11 (wireless LANs) : no collision detection and hidden terminal problem
Concepts you should know
l
l
l
l
Aloha
CSMA/CD
CSMA/CA
shared medium access protocol
Further recommended reading:
Ethernet
[Walrand Varaiya]chapter 3.1-3.2
[Halsall] chapters 6.3.2 and 7.3.2
[BG] chapter 4
Big-LAN FAQ
Ethernet FAQ
Token Bus, Token Ring, FDDI, 100VG, Wireless LANs, other LANs
[Walrand Varaiya]chapter 3.3-3.8
[Halsall] chapters 6
and 7
[BG] chapters 4.5.3 and 4.5.5
Token Ring Network Architecture reference
(IBM doc number SC30-3374-02)
Download