NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and...
-
Upload
ashlie-morton -
Category
Documents
-
view
216 -
download
0
Transcript of NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and...
NET0183 Networks and Communications by Dr Andy Brooks
1
NET0183 Networks and Communications
Lectures 5 and 6Ethernet
8/25/2009
“Ethernet is named for the historical luminiferous ether through which electromagnetic radiations were once alleged to propagate.”
ethernet/íðnet
Nobody is heard correctly.
NET0183 Networks and Communications by Dr Andy Brooks
28/25/2009
Historical Case Studyhttp://portal.acm.org/beta/citation.cfm?id=360253
1976
NET0183 Networks and Communications by Dr Andy Brooks
3
1. Background• “One can characterize distributed computing as a spectrum of
activities varying in their degree of decentralization, with one extreme being remote computer networking and the other extreme being multiprocessing.”
• “Remote computer networking is the loose interconnection of previously isolated, widely separated, and rather large computing systems.” – e.g. ALOHANET of 1970...
• “Multiprocessing is the construction of previously monolithic and serial computing systems from increasingly numerous and smaller pieces computing in parallel.”– e.g. dual or multi-core processors in laptop computers of 2010...
• “Near the middle of this spectrum is local networking…”8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
4
The distributed computing spectrum in 1976.
8/25/2009
Mbps here is mega bit per second.
NET0183 Networks and Communications by Dr Andy Brooks
58/25/2009
http://en.wikipedia.org/wiki/Data_rate_units
103
106
MBps here is mega byte per second.
NET0183 Networks and Communications by Dr Andy Brooks
68/25/2009
http://en.wikipedia.org/wiki/Data_rate_units
109
1012
NET0183 Networks and Communications by Dr Andy Brooks
78/25/2009
http://www.ntt.co.jp/news/news06e/0609/060929a.html 2006
NET0183 Networks and Communications by Dr Andy Brooks
8
Local Area Networkhttp://en.wikipedia.org/wiki/Local_area_network
8/25/2009
A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics of LANs, in contrast to wide-area networks (WANs), include their usually higher data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines.
ARCNET, Token Ring and many other technologies have been used in the past, and G.hn may be used in the future, but Ethernet over twisted pair cabling, and Wi-Fi are the two most common technologies currently in use.
NET0183 Networks and Communications by Dr Andy Brooks
98/25/2009
“Just as computer networks have grown across continents and oceans to interconnect major computing facilities around the world, they are now growing down corridors and between buildings to interconnect mini-computers in offices and laboratories .”
NET0183 Networks and Communications by Dr Andy Brooks
10
3. Design Principles
• The network should be able to grow smoothly to accommodate several buildings.
• The communication system must be inexpensive.• Control should be distributed to avoid the reliability
problems of a central controller.– If a central controller goes down, the whole network is down.
• The initial design of the Ethernet was based on ALOHANET. Ethernet is a broadcast packet switching network, and not a store and forward network like ARPANET.
8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
11
3. Design Principles• Like ALOHANET, Ethernet was expected to carry bursty traffic so that
“conventional synchronous time-division multiplexing (STDM) would be inefficient”.– Allocating each node a time slot would be wasteful. Many time slots would
go unused.• “The Ether is a logically passive medium for the propagation of
digital signals and can be constructed using any number of media including coaxial cables, twisted pairs, and optical fibers.”
• Several design innovations were also necessary, including the idea of detecting interference with a packet as it is being transmitted.– When we start to speak, if we hear many other voices speaking, we stop
speaking because we know we will not be heard properly. We wait for a quieter moment.
8/25/2009
coaxial cable/samása strengurfibre optics/ljósþráðatækni
NET0183 Networks and Communications by Dr Andy Brooks
12
3.1 Topology
• A topology was chosen to make it easy to meet the changing needs of office and laboratory buildings.– “Any station wishing to join an Ethernet taps into the Ether at
the nearest convenient point.”• The topology is that of an unrooted tree.
– There is only one path between any source and destination, so avoiding multipath interference.
– Being unrooted, the network can be extended from any point in any direction.
– The tree is a logically passive medium. A failure of an active element should affect communications at a single node only.
8/25/2009
topology/grannfræði
NET0183 Networks and Communications by Dr Andy Brooks
138/25/2009
“Unlike an Aloha Network, which is a star network with an outgoing broadcast channel and an incoming multi-access channel, an Ethernet supports many-to- many communication with a single broadcast multi-access channel.”
Some high-level network topologies.
http://www.11h11.com/hugobox/chaku/NetworkTopologies.png
NET0183 Networks and Communications by Dr Andy Brooks
148/25/2009
Figure 1. A two-segment Ethernet. ©ACM
Segment #1 might be in one corridor with the network cable run under the floor or in the ceiling. Segment #2 might represent the cable being run down another corridor.
A transceiver is a device that both transmits and receives signals.
“A tap is a device for physically connecting to the Ether while disturbing its transmission characteristics as little as possible.”
Andy comments: This figure illustrates that a high-level topological map of a network can disguise the relationship between the nodes and the network cable. Ethernet is an unrooted tree regarding the cable. Stations tap into this unrooted tree.
1976
Tap
Terminator
#1
#2
transceiver/sendiviðtæki
NET0183 Networks and Communications by Dr Andy Brooks
15
3.2 Control
• Stations might attempt to transmit a packet at roughly the same time resulting in packets which overlap and which are unrecognisable to receivers. Packets are said to collide.
• A station abandons a transmission when a collision has been detected.
• Stations then attempt to retransmit packets after a random period of time.
• Ethernet controllers in each station adjust the mean retransmission interval in proportion to the count of collisions.– As collisions increase, the random time intervals before
retransmission increase.8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
16
3.2 Control
• “A station could usurp the Ether by not adjusting its retransmission interval with increasing traffic or by sending very large packets. Both practices are now prohibited by low-level software in each station.”
8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
17
3.3 Addressing
• Each packet has a source and destination specified in the packet´s header.
• Any station can read a packet into its memory but normally only the destination station would do this.
• A zero destination address is a wildcard which matches all addresses. – “A packet with a destination of zero is called a broadcast
packet”.
8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
18
3.4 Reliability
• Packets may be lost because of noise or a downed receiver at a packet´s intended destination.– The Ethernet does not guarantee error-free communication.
• “Protocols used to communicate through an Ethernet must assume that packets will be received correctly at intended destinations only with high probability.”– Applications have to deal with error recovery.
• “This policy becomes more important as Ethernets are interconnected in a hierarchy of networks through which packets must travel farther and suffer greater risks.”
8/25/2009
reliability/áreiðanleiki
NET0183 Networks and Communications by Dr Andy Brooks
19
3.5.1 Carrier detection
• A packet´s bits are phase encoded which means there is at least one transition each bit time.
• Receivers can listen to the passing of a packet.• “... we speak of the presence of a carrier as a packet passes a
transceiver.”• “With carrier detection we are able to implement
deference: no station will start transmitting while hearing carrier.”
• “With carrier detection, collisions should occur only when two or more stations find the Ether silent and begin transmitting simultaneously: within an Ether end-to-end propagation time.”– It takes time for signals to travel the length of the network cable.
8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
20
3.5.2 Interference detection
• “Interference is indicated when the transceiver notices a difference between the value of the bit it is receiving from the Ether and the value of the bit it is attempting to transmit.”
• A packet can be scheduled for retransmission as soon as it is found to have been damaged.
• Only a fraction of packet time is wasted since damaged packets are truncated, in contrast to ALOHANET where colliding packets ran to completion.
• The frequency of collisions is used to adjust retransmission intervals to help make better use of the communication channel.– As collisions increase, the random time intervals before
retransmission increase.8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
21
3.5.3 Packet error detection
• During transmission a checksum is computed and added to a packet. When the packet is read from the Ether, the checksum is recomputed.– hardware checksum
• Packets are discarded if the checksums are inconsistent.• “In this way transmission errors, impulse noise errors,
and errors due to undetected interference are caught at a packet's destination.”
8/25/2009
checksum/prófsumma
Andy comments: A simple checksum breaks a message down into fixed-sized words and then adds the numeric value of these words together. Zero bits may have to be appended at the end of the message to have a properly-sized word.
NET0183 Networks and Communications by Dr Andy Brooks
22
3.5.4 Truncated packet filtering
• To reduce the processing load at listening stations, truncated packets (only a few bits) are filtered out in hardware.
8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
23
3.5.5 Collision consensus enforcement
• “When a station determines that its transmission is experiencing interference, it momentarily jams the Ether to insure that all other participants in the collision will detect interference and, because of deference, will be forced to abort.”
8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
24
4. Implementation• Parameters of the experimental Etherenet were: 1 kilometre, 3
megabits per second, and 256 stations.– 28 = 256
• The first byte of a packet was the destination address field.• The second byte of a packet was the source address field.• “256 is a number small enough to allow each station to get
an adequate share of the available bandwidth and approaches the limit of what we can achieve with current techniques for tapping cables.”
• Higher level protocols “can accommodate extended address spaces with additional fields inside the packet and software to interpret them”.
8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
25
4.1 Ether
• The experimental ethernet was implemented using low-loss coaxial cable with off-the-shelf CATV taps and connectors.– CATV Community Antenna Television
• A smaller-diameter coax was used within station clusters and a larger-diameter coax for low-loss runs between clusters.– Larger-diameter coax suffers less signal attenuation.
• “The cost of coaxial cable Ether is insignificant relative to the cost of the distributed computing systems supported by Ethernet.”
8/25/2009
coaxial
NET0183 Networks and Communications by Dr Andy Brooks
26
4.2 Transceivers• The transceivers can tolerate everyday electrical noise from
typewriters and electric drills.• “When unpowered, the transceievr disconnects itself electrically
from the Ether.”• A broken transceiver should not bring down the whole Ethernet.
– A watchdog circuit shuts down the transceiver if the output stage “acts suspiciously”.
• “Even though our experimental transceivers are very simple and can tolerate only limited signal attenuation, they have proven quite adequate and reliable. A more sophisticated transceiver design might permit passive branching of the Ether and wider station separation.”– passive branching : without repeaters
8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
27
4.3 Interface
• The interface serializes and deserializes the parallel data used by its station.– bit bit bit...<->16-bit word, 16-bit word, 16-bit word
• Interfaces have hardware to compute a 16-bit cyclic redundancy checksum (CRC) on serial data as it is transmitted and received.– CRCs provide protection against errors in the Ether and not against
errors in the parallel portions of the interface hardware or station.• “Higher-level software checksums are recommended for
applications in which a higher degree of reliability is required.”
8/25/2009
Andy comments: More and more checks to ensure that data has been transmitted correctly and that data has not be compromised by malware, means that more and more of the bandwidth is used just for checking.
NET0183 Networks and Communications by Dr Andy Brooks
28
4.3 Interface
• “When carrier goes away, the interface checks that an integral number of 16-bit words has been received and that the CRC is correct. The last word received is assumed to be the CRC and is not copied into the packet buffer.” – The packet buffer is in the station´s main memory.
• “These interfaces ordinarily include hardware for accepting only those packets with appropriate addresses in their headers.”– Hardware address filtering reduces packet processing in software.
• Interfaces had to be built for several different stations on the experimental ethernet.
8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
29
Fig. 2. Ethernet packet layout.
8/25/2009
1976
hardwarechecksum
NET0183 Networks and Communications by Dr Andy Brooks
30
4.4 Controller• A controller is station-specific firmware or software which
controls getting packets on or off the Ether.• Retransmission intervals are multiples of a slot, “the maximum
time between starting a transmission and detecting a collision.”– end-to-end round trip delay
• “Each time a transmission attempt ends in collision, the controller delays for an interval of random length with a mean twice that of the previous interval,…”– “This heuristic approximates an algorithm we have called Binary
Exponential Backoff.”• “When the network is unloaded and collisions are rare, the
mean seldom departs from one and retransmissions are prompt.”
8/25/2009
one slot
NET0183 Networks and Communications by Dr Andy Brooks
31
5.1 Signal Cover
• To support growth of the network, a simple unbuffered packet repeater can be used to extend signal cover.
• Using repeaters, however, makes the Ether active rather than passive.– When a transceiver goes down, only its station ceases
communication. When a repeater goes down, communications are severed with a whole section of the network.
• “We operate an experimental two-segment packet repeater, but hope to avoid relying on them.”– More sophisticated transceivers can be used instead of relying
on repeaters to extend the signal cover.
8/25/2009
5. Growth
NET0183 Networks and Communications by Dr Andy Brooks
32
5.2 Traffic Cover
• Adding more stations will eventually put too much load on the network.
• One solution is to use packet filters.– An unbuffered traffic-filtering repeater.– A packet filter also extends the signal cover.
• Packet filters only pass packets from one Ether segment to the other if the destination station is located on the new segment.
8/25/2009
5. Growth
Andy comments: Security firewalls can use packet filtering. Packets are inspected according to various rules and are passed through the firewall only if they do not break any rule.
NET0183 Networks and Communications by Dr Andy Brooks
33
5.3 Address Cover
• Experimental Ethernet has only an 8-bit address. Continued growth of the network will mean the number of stations will exceed 256.
• Addresses can be extended down into a station by adding fields to identify ports or processes within a station.
• Addresses can be extended up into the internetwork by adding fields to identify destination stations on remote networks.
• Address cover can be extended using packet gateways. “A gateway repeats packets addressed to itself as an intermediary”.
8/25/2009
5. Growth
NET0183 Networks and Communications by Dr Andy Brooks
34
5.3 Address Cover
• A gateway also extends the signal and traffic cover.• “Failure of the single repeater connecting two
segments partitions the network; failure of a gateway need not partition the net if there are paths through other gateways between the segments.”
8/25/2009
5. Growth
NET0183 Networks and Communications by Dr Andy Brooks
35
7. Protocol
8/25/2009
“There is more to the construction of a viable packet communication system than simply providing the mechanisms for packet transport. Methods for error correction, flow control, process naming, security, and accounting must also be provided through higher-level protocols implemented on top of the Ether control protocol described in Sections 3 and 4 above.”
protocol/samskiptareglur
NET0183 Networks and Communications by Dr Andy Brooks
36
7.2 EFTP• EFTP (Ethernet File Transfer Protocol) is one simple
error-controlling packet protocol.– The first 16 bits are the destination and source
addresses.– The second 16 bits contain the packet type.
• data, ack, abort, end, endreply
– The next 16 bits are a sequence number.– The next 16 bits are a length.– After a number of optional 16-bit data words, there is a
16-bit software checksum.• “The Ethernet´s hardware checksum is present only on the
Ether and is not counted at this level of protocol.”8/25/2009
file transfer/skráaflutningur
NET0183 Networks and Communications by Dr Andy Brooks
37
Fig. 4. EFTP packet layout ©ACM
8/25/2009
software checksum
NET0183 Networks and Communications by Dr Andy Brooks
38
7.2 EFTP
• The software checksum protects against failures in parallel data paths within stations that are not checked by the CRC.
• A file´s data packets are numbered from 0.• “Each data packet is retransmitted periodically by the
sender until an ack packet with a matching sequence number is returned from the receiver.”
• “When a packet arrives with a sequence number one less than that expected, it is acknowledged and discarded; the presumption is that its ack was lost and needs retransmission.”
8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
39
7.2 EFTP
• “When all the data has been transmitted, an end packet is sent with the next consecutive sequence number and than the sender waits for a matching endreply.”
• “At any time during all of this, either side is free to decide communication has failed and just give up, it is considered polite to send an abort packet to end the communication promptly in the event of, say, a user-initiated abort or a file system error.”
8/25/2009
NET0183 Networks and Communications by Dr Andy Brooks
40
7.2.3 EFTP shortcomings
• The protocol only provides for file transfer between stations in a single network.– The protocol does not deal with processes within stations or
with gateways between networks.• Different users of a station are not distinguished.
• Files are unnamed.• Data is transmitted in integral numbers of 16-bit words.
– What happens when the file is an odd number of bytes?
8/25/2009
1976