NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and...

40
NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the historical luminiferous ether through which electromagnetic radiations were once alleged to propagate.” thernet/íðnet Nobody is heard correctly.

Transcript of NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and...

Page 1: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

1

NET0183 Networks and Communications

Lectures 5 and 6Ethernet

8/25/2009

“Ethernet is named for the historical luminiferous ether through which electromagnetic radiations were once alleged to propagate.”

ethernet/íðnet

Nobody is heard correctly.

Page 2: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

28/25/2009

Historical Case Studyhttp://portal.acm.org/beta/citation.cfm?id=360253

1976

Page 3: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

3

1. Background• “One can characterize distributed computing as a spectrum of

activities varying in their degree of decentralization, with one extreme being remote computer networking and the other extreme being multiprocessing.”

• “Remote computer networking is the loose interconnection of previously isolated, widely separated, and rather large computing systems.” – e.g. ALOHANET of 1970...

• “Multiprocessing is the construction of previously monolithic and serial computing systems from increasingly numerous and smaller pieces computing in parallel.”– e.g. dual or multi-core processors in laptop computers of 2010...

• “Near the middle of this spectrum is local networking…”8/25/2009

Page 4: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

4

The distributed computing spectrum in 1976.

8/25/2009

Mbps here is mega bit per second.

Page 5: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

58/25/2009

http://en.wikipedia.org/wiki/Data_rate_units

103

106

MBps here is mega byte per second.

Page 6: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

68/25/2009

http://en.wikipedia.org/wiki/Data_rate_units

109

1012

Page 7: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

78/25/2009

http://www.ntt.co.jp/news/news06e/0609/060929a.html 2006

Page 8: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

8

Local Area Networkhttp://en.wikipedia.org/wiki/Local_area_network

8/25/2009

A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics of LANs, in contrast to wide-area networks (WANs), include their usually higher data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines.

ARCNET, Token Ring and many other technologies have been used in the past, and G.hn may be used in the future, but Ethernet over twisted pair cabling, and Wi-Fi are the two most common technologies currently in use.

Page 9: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

98/25/2009

“Just as computer networks have grown across continents and oceans to interconnect major computing facilities around the world, they are now growing down corridors and between buildings to interconnect mini-computers in offices and laboratories .”

Page 10: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

10

3. Design Principles

• The network should be able to grow smoothly to accommodate several buildings.

• The communication system must be inexpensive.• Control should be distributed to avoid the reliability

problems of a central controller.– If a central controller goes down, the whole network is down.

• The initial design of the Ethernet was based on ALOHANET. Ethernet is a broadcast packet switching network, and not a store and forward network like ARPANET.

8/25/2009

Page 11: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

11

3. Design Principles• Like ALOHANET, Ethernet was expected to carry bursty traffic so that

“conventional synchronous time-division multiplexing (STDM) would be inefficient”.– Allocating each node a time slot would be wasteful. Many time slots would

go unused.• “The Ether is a logically passive medium for the propagation of

digital signals and can be constructed using any number of media including coaxial cables, twisted pairs, and optical fibers.”

• Several design innovations were also necessary, including the idea of detecting interference with a packet as it is being transmitted.– When we start to speak, if we hear many other voices speaking, we stop

speaking because we know we will not be heard properly. We wait for a quieter moment.

8/25/2009

coaxial cable/samása strengurfibre optics/ljósþráðatækni

Page 12: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

12

3.1 Topology

• A topology was chosen to make it easy to meet the changing needs of office and laboratory buildings.– “Any station wishing to join an Ethernet taps into the Ether at

the nearest convenient point.”• The topology is that of an unrooted tree.

– There is only one path between any source and destination, so avoiding multipath interference.

– Being unrooted, the network can be extended from any point in any direction.

– The tree is a logically passive medium. A failure of an active element should affect communications at a single node only.

8/25/2009

topology/grannfræði

Page 13: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

138/25/2009

“Unlike an Aloha Network, which is a star network with an outgoing broadcast channel and an incoming multi-access channel, an Ethernet supports many-to- many communication with a single broadcast multi-access channel.”

Some high-level network topologies.

http://www.11h11.com/hugobox/chaku/NetworkTopologies.png

Page 14: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

148/25/2009

Figure 1. A two-segment Ethernet. ©ACM

Segment #1 might be in one corridor with the network cable run under the floor or in the ceiling. Segment #2 might represent the cable being run down another corridor.

A transceiver is a device that both transmits and receives signals.

“A tap is a device for physically connecting to the Ether while disturbing its transmission characteristics as little as possible.”

Andy comments: This figure illustrates that a high-level topological map of a network can disguise the relationship between the nodes and the network cable. Ethernet is an unrooted tree regarding the cable. Stations tap into this unrooted tree.

1976

Tap

Terminator

#1

#2

transceiver/sendiviðtæki

Page 15: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

15

3.2 Control

• Stations might attempt to transmit a packet at roughly the same time resulting in packets which overlap and which are unrecognisable to receivers. Packets are said to collide.

• A station abandons a transmission when a collision has been detected.

• Stations then attempt to retransmit packets after a random period of time.

• Ethernet controllers in each station adjust the mean retransmission interval in proportion to the count of collisions.– As collisions increase, the random time intervals before

retransmission increase.8/25/2009

Page 16: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

16

3.2 Control

• “A station could usurp the Ether by not adjusting its retransmission interval with increasing traffic or by sending very large packets. Both practices are now prohibited by low-level software in each station.”

8/25/2009

Page 17: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

17

3.3 Addressing

• Each packet has a source and destination specified in the packet´s header.

• Any station can read a packet into its memory but normally only the destination station would do this.

• A zero destination address is a wildcard which matches all addresses. – “A packet with a destination of zero is called a broadcast

packet”.

8/25/2009

Page 18: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

18

3.4 Reliability

• Packets may be lost because of noise or a downed receiver at a packet´s intended destination.– The Ethernet does not guarantee error-free communication.

• “Protocols used to communicate through an Ethernet must assume that packets will be received correctly at intended destinations only with high probability.”– Applications have to deal with error recovery.

• “This policy becomes more important as Ethernets are interconnected in a hierarchy of networks through which packets must travel farther and suffer greater risks.”

8/25/2009

reliability/áreiðanleiki

Page 19: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

19

3.5.1 Carrier detection

• A packet´s bits are phase encoded which means there is at least one transition each bit time.

• Receivers can listen to the passing of a packet.• “... we speak of the presence of a carrier as a packet passes a

transceiver.”• “With carrier detection we are able to implement

deference: no station will start transmitting while hearing carrier.”

• “With carrier detection, collisions should occur only when two or more stations find the Ether silent and begin transmitting simultaneously: within an Ether end-to-end propagation time.”– It takes time for signals to travel the length of the network cable.

8/25/2009

Page 20: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

20

3.5.2 Interference detection

• “Interference is indicated when the transceiver notices a difference between the value of the bit it is receiving from the Ether and the value of the bit it is attempting to transmit.”

• A packet can be scheduled for retransmission as soon as it is found to have been damaged.

• Only a fraction of packet time is wasted since damaged packets are truncated, in contrast to ALOHANET where colliding packets ran to completion.

• The frequency of collisions is used to adjust retransmission intervals to help make better use of the communication channel.– As collisions increase, the random time intervals before

retransmission increase.8/25/2009

Page 21: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

21

3.5.3 Packet error detection

• During transmission a checksum is computed and added to a packet. When the packet is read from the Ether, the checksum is recomputed.– hardware checksum

• Packets are discarded if the checksums are inconsistent.• “In this way transmission errors, impulse noise errors,

and errors due to undetected interference are caught at a packet's destination.”

8/25/2009

checksum/prófsumma

Andy comments: A simple checksum breaks a message down into fixed-sized words and then adds the numeric value of these words together. Zero bits may have to be appended at the end of the message to have a properly-sized word.

Page 22: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

22

3.5.4 Truncated packet filtering

• To reduce the processing load at listening stations, truncated packets (only a few bits) are filtered out in hardware.

8/25/2009

Page 23: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

23

3.5.5 Collision consensus enforcement

• “When a station determines that its transmission is experiencing interference, it momentarily jams the Ether to insure that all other participants in the collision will detect interference and, because of deference, will be forced to abort.”

8/25/2009

Page 24: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

24

4. Implementation• Parameters of the experimental Etherenet were: 1 kilometre, 3

megabits per second, and 256 stations.– 28 = 256

• The first byte of a packet was the destination address field.• The second byte of a packet was the source address field.• “256 is a number small enough to allow each station to get

an adequate share of the available bandwidth and approaches the limit of what we can achieve with current techniques for tapping cables.”

• Higher level protocols “can accommodate extended address spaces with additional fields inside the packet and software to interpret them”.

8/25/2009

Page 25: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

25

4.1 Ether

• The experimental ethernet was implemented using low-loss coaxial cable with off-the-shelf CATV taps and connectors.– CATV Community Antenna Television

• A smaller-diameter coax was used within station clusters and a larger-diameter coax for low-loss runs between clusters.– Larger-diameter coax suffers less signal attenuation.

• “The cost of coaxial cable Ether is insignificant relative to the cost of the distributed computing systems supported by Ethernet.”

8/25/2009

coaxial

Page 26: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

26

4.2 Transceivers• The transceivers can tolerate everyday electrical noise from

typewriters and electric drills.• “When unpowered, the transceievr disconnects itself electrically

from the Ether.”• A broken transceiver should not bring down the whole Ethernet.

– A watchdog circuit shuts down the transceiver if the output stage “acts suspiciously”.

• “Even though our experimental transceivers are very simple and can tolerate only limited signal attenuation, they have proven quite adequate and reliable. A more sophisticated transceiver design might permit passive branching of the Ether and wider station separation.”– passive branching : without repeaters

8/25/2009

Page 27: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

27

4.3 Interface

• The interface serializes and deserializes the parallel data used by its station.– bit bit bit...<->16-bit word, 16-bit word, 16-bit word

• Interfaces have hardware to compute a 16-bit cyclic redundancy checksum (CRC) on serial data as it is transmitted and received.– CRCs provide protection against errors in the Ether and not against

errors in the parallel portions of the interface hardware or station.• “Higher-level software checksums are recommended for

applications in which a higher degree of reliability is required.”

8/25/2009

Andy comments: More and more checks to ensure that data has been transmitted correctly and that data has not be compromised by malware, means that more and more of the bandwidth is used just for checking.

Page 28: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

28

4.3 Interface

• “When carrier goes away, the interface checks that an integral number of 16-bit words has been received and that the CRC is correct. The last word received is assumed to be the CRC and is not copied into the packet buffer.” – The packet buffer is in the station´s main memory.

• “These interfaces ordinarily include hardware for accepting only those packets with appropriate addresses in their headers.”– Hardware address filtering reduces packet processing in software.

• Interfaces had to be built for several different stations on the experimental ethernet.

8/25/2009

Page 29: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

29

Fig. 2. Ethernet packet layout.

8/25/2009

1976

hardwarechecksum

Page 30: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

30

4.4 Controller• A controller is station-specific firmware or software which

controls getting packets on or off the Ether.• Retransmission intervals are multiples of a slot, “the maximum

time between starting a transmission and detecting a collision.”– end-to-end round trip delay

• “Each time a transmission attempt ends in collision, the controller delays for an interval of random length with a mean twice that of the previous interval,…”– “This heuristic approximates an algorithm we have called Binary

Exponential Backoff.”• “When the network is unloaded and collisions are rare, the

mean seldom departs from one and retransmissions are prompt.”

8/25/2009

one slot

Page 31: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

31

5.1 Signal Cover

• To support growth of the network, a simple unbuffered packet repeater can be used to extend signal cover.

• Using repeaters, however, makes the Ether active rather than passive.– When a transceiver goes down, only its station ceases

communication. When a repeater goes down, communications are severed with a whole section of the network.

• “We operate an experimental two-segment packet repeater, but hope to avoid relying on them.”– More sophisticated transceivers can be used instead of relying

on repeaters to extend the signal cover.

8/25/2009

5. Growth

Page 32: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

32

5.2 Traffic Cover

• Adding more stations will eventually put too much load on the network.

• One solution is to use packet filters.– An unbuffered traffic-filtering repeater.– A packet filter also extends the signal cover.

• Packet filters only pass packets from one Ether segment to the other if the destination station is located on the new segment.

8/25/2009

5. Growth

Andy comments: Security firewalls can use packet filtering. Packets are inspected according to various rules and are passed through the firewall only if they do not break any rule.

Page 33: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

33

5.3 Address Cover

• Experimental Ethernet has only an 8-bit address. Continued growth of the network will mean the number of stations will exceed 256.

• Addresses can be extended down into a station by adding fields to identify ports or processes within a station.

• Addresses can be extended up into the internetwork by adding fields to identify destination stations on remote networks.

• Address cover can be extended using packet gateways. “A gateway repeats packets addressed to itself as an intermediary”.

8/25/2009

5. Growth

Page 34: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

34

5.3 Address Cover

• A gateway also extends the signal and traffic cover.• “Failure of the single repeater connecting two

segments partitions the network; failure of a gateway need not partition the net if there are paths through other gateways between the segments.”

8/25/2009

5. Growth

Page 35: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

35

7. Protocol

8/25/2009

“There is more to the construction of a viable packet communication system than simply providing the mechanisms for packet transport. Methods for error correction, flow control, process naming, security, and accounting must also be provided through higher-level protocols implemented on top of the Ether control protocol described in Sections 3 and 4 above.”

protocol/samskiptareglur

Page 36: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

36

7.2 EFTP• EFTP (Ethernet File Transfer Protocol) is one simple

error-controlling packet protocol.– The first 16 bits are the destination and source

addresses.– The second 16 bits contain the packet type.

• data, ack, abort, end, endreply

– The next 16 bits are a sequence number.– The next 16 bits are a length.– After a number of optional 16-bit data words, there is a

16-bit software checksum.• “The Ethernet´s hardware checksum is present only on the

Ether and is not counted at this level of protocol.”8/25/2009

file transfer/skráaflutningur

Page 37: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

37

Fig. 4. EFTP packet layout ©ACM

8/25/2009

software checksum

Page 38: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

38

7.2 EFTP

• The software checksum protects against failures in parallel data paths within stations that are not checked by the CRC.

• A file´s data packets are numbered from 0.• “Each data packet is retransmitted periodically by the

sender until an ack packet with a matching sequence number is returned from the receiver.”

• “When a packet arrives with a sequence number one less than that expected, it is acknowledged and discarded; the presumption is that its ack was lost and needs retransmission.”

8/25/2009

Page 39: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

39

7.2 EFTP

• “When all the data has been transmitted, an end packet is sent with the next consecutive sequence number and than the sender waits for a matching endreply.”

• “At any time during all of this, either side is free to decide communication has failed and just give up, it is considered polite to send an abort packet to end the communication promptly in the event of, say, a user-initiated abort or a file system error.”

8/25/2009

Page 40: NET0183 Networks and Communications Lectures 5 and 6 Ethernet 8/25/20091 NET0183 Networks and Communications by Dr Andy Brooks “Ethernet is named for the.

NET0183 Networks and Communications by Dr Andy Brooks

40

7.2.3 EFTP shortcomings

• The protocol only provides for file transfer between stations in a single network.– The protocol does not deal with processes within stations or

with gateways between networks.• Different users of a station are not distinguished.

• Files are unnamed.• Data is transmitted in integral numbers of 16-bit words.

– What happens when the file is an odd number of bytes?

8/25/2009

1976