0% found this document useful (0 votes)
30 views

Review: Multicast Routing

The document discusses several topics related to computer networking: 1. It discusses three options for multicast routing - source-based trees, group-shared trees, and data link layer services for error detection using techniques like CRC. 2. It then covers multiple access protocols for shared mediums like Ethernet, including random access protocols like ALOHA and CSMA, and how they aim to allow nodes to share the channel. 3. It discusses how nodes on a local area network (LAN) are assigned addresses, and the use of the Address Resolution Protocol (ARP) to map between IP addresses and MAC addresses on the same LAN.

Uploaded by

PrabhatSingh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views

Review: Multicast Routing

The document discusses several topics related to computer networking: 1. It discusses three options for multicast routing - source-based trees, group-shared trees, and data link layer services for error detection using techniques like CRC. 2. It then covers multiple access protocols for shared mediums like Ethernet, including random access protocols like ALOHA and CSMA, and how they aim to allow nodes to share the channel. 3. It discusses how nodes on a local area network (LAN) are assigned addresses, and the use of the Address Resolution Protocol (ARP) to map between IP addresses and MAC addresses on the same LAN.

Uploaded by

PrabhatSingh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Review

❒ Multicast Routing
❍ Three options
❍ source-based tree: one tree per source
• shortest path trees
• reverse path forwarding
❍ group-shared tree: group uses one tree
• minimal spanning (Steiner)
• center-based trees
❒ Data Link Layer Services
❍ Error detection
• Single bit
• Two dimensional
❒ Recitation tomorrow for Project 3
Some slides are in courtesy of J. Kurose and K. Ross
Overview

❒ Error Detection: CRC


❒ Multiple access protocols
❒ LAN addresses and ARP
❒ Ethernet
Checksumming: Cyclic Redundancy Check
❒ view data bits, D, as a binary number
❒ choose r+1 bit pattern (generator), G
❒ goal: choose r CRC bits, R, such that
❍ <D,R> exactly divisible by G (modulo 2)
❍ receiver knows G, divides <D,R> by G. If non-zero remainder:
error detected!
❍ can detect all burst errors less than r+1 bits
❒ widely used in practice (ATM, HDCL)
CRC Example
Want:
D.2r XOR R = nG
equivalently:
D.2r = nG XOR R
equivalently:
if we divide D.2r by
G, want remainder R

D.2r
R = remainder[ ]
G
Overview

❒ Error Detection: CRC


❒ Multiple access protocols
❒ LAN addresses and ARP
❒ Ethernet
Multiple Access Links and Protocols
Two types of “links”:
❒ point-to-point
❍ PPP for dial-up access
❍ point-to-point link between Ethernet switch and host
❒ broadcast (shared wire or medium)
❍ traditional Ethernet
❍ upstream HFC
❍ 802.11 wireless LAN
Multiple Access protocols
❒ single shared broadcast channel
❒ two or more simultaneous transmissions by
nodes: interference
❍ only one node can send successfully at a time
multiple access protocol
❒ distributed algorithm that determines how
nodes share channel, i.e., determine when node
can transmit
❒ communication about channel sharing must use
channel itself!
Ideal Multiple Access Protocol
Broadcast channel of rate R bps
1. When one node wants to transmit, it can send at
rate R.
2. When M nodes want to transmit, each can send at
average rate R/M
3. Fully decentralized:
❍ no special node to coordinate transmissions
❍ no synchronization of clocks, slots
4. Simple
MAC Protocols: a taxonomy
Three broad classes:
❒ Channel Partitioning
❍ divide channel into smaller “pieces” (time slots,
frequency, code) – TDMA, FDMA, CDMA
❍ allocate piece to node for exclusive use
❒ Random Access
❍ channel not divided, allow collisions
❍ “recover” from collisions
Random Access Protocols
❒ When node has packet to send
❍ transmit at full channel data rate R.
❍ no a priori coordination among nodes
❒ two or more transmitting nodes -> “collision”,
❒ random access MAC protocol specifies:
❍ how to detect collisions
❍ how to recover from collisions (e.g., via delayed
retransmissions)
❒ Examples of random access MAC protocols:
❍ slotted ALOHA
❍ ALOHA
❍ CSMA, CSMA/CD, CSMA/CA
Slotted ALOHA
Assumptions Operation
❒ all frames same size ❒ when node obtains fresh
❒ time is divided into frame, it transmits in next
equal size slots, time to slot
transmit 1 frame ❒ no collision, node can send
❒ nodes start to transmit new frame in next slot
frames only at ❒ if collision, node
beginning of slots retransmits frame in each
❒ nodes are synchronized subsequent slot with prob.
❒ if 2 or more nodes
p until success
transmit in slot, all
nodes detect collision
Slotted ALOHA

Pros Cons
❒ single active node can ❒ collisions, wasting slots
continuously transmit ❒ idle slots
at full rate of channel ❒ nodes may be able to
❒ highly decentralized: detect collision in less
only slots in nodes than time to transmit
need to be in sync packet
❒ simple
Slotted Aloha efficiency
Efficiency is the long-run ❒ For max efficiency
fraction of successful slots with N nodes, find p*
when there’s many nodes, each that maximizes
with many frames to send Np(1-p)N-1
❒ For many nodes, take
❒ Suppose N nodes with limit of Np*(1-p*)N-1
many frames to send, as N goes to infinity,
each transmits in slot gives 1/e = .37
with probability p
❒ prob that 1st node has At best: channel
success in a slot used for useful
= p(1-p)N-1 transmissions 37%
❒ prob that any node has of time!
a success = Np(1-p)N-1
CSMA (Carrier Sense Multiple Access)

CSMA: listen before transmit:


❒ If channel sensed idle: transmit entire frame
❒ If channel sensed busy, defer transmission

❒ Human analogy: don’t interrupt others!


CSMA collisions spatial layout of nodes

collisions can still occur:


propagation delay means
two nodes may not hear
each other’s transmission

collision:
entire packet transmission
time wasted
note:
role of distance & propagation
delay in determining collision
probability
CSMA/CD (Collision Detection)
CSMA/CD: carrier sensing, deferral as in CSMA
❍ collisions detected within short time
❍ colliding transmissions aborted, reducing channel
wastage
❒ collision detection:
❍ easy in wired LANs: measure signal strengths,
compare transmitted, received signals
❍ difficult in wireless LANs: receiver shut off while
transmitting
❒ human analogy: the polite conversationalist
CSMA/CD collision detection
Summary of MAC protocols
❒ What do you do with a shared media?
❍ Channel Partitioning, by time, frequency or code
• Time Division,Code Division, Frequency Division
❍ Random partitioning (dynamic),
• ALOHA, CSMA, CSMA/CD
• carrier sensing: easy in some technologies (wire), hard
in others (wireless)
• CSMA/CD used in Ethernet
Overview

❒ Error Detection: CRC


❒ Multiple access protocols
❒ LAN addresses and ARP
❒ Ethernet
LAN technologies
Data link layer so far:
❍ services, error detection/correction, multiple
access
Next: LAN technologies
❍ addressing
❍ Ethernet
❍ hubs, bridges, switches
❍ 802.11
❍ PPP
❍ ATM
LAN Addresses and ARP
32-bit IP address:
❒ network-layer address
❒ used to get datagram to destination IP network
(recall IP network definition)
LAN (or MAC or physical or Ethernet) address:
❒ used to get datagram from one interface to another
physically-connected interface (same network)
❒ 48 bit MAC address (for most LANs)
burned in the adapter ROM
LAN Addresses and ARP
Each adapter on LAN has unique LAN address
LAN Address (more)
❒ MAC address allocation administered by IEEE
❒ manufacturer buys portion of MAC address space
(to assure uniqueness)
❒ Analogy:
(a) MAC address: like Social Security Number
(b) IP address: like postal address
❒ MAC flat address => portability
❍ can move LAN card from one LAN to another
❒ IP hierarchical address NOT portable
❍ depends on IP network to which node is attached
Recall earlier routing discussion
Starting at A, given IP A 223.1.1.1
datagram addressed to B:
223.1.2.1
❒ look up net. address of B, find B 223.1.1.2
on same net. as A 223.1.1.4 223.1.2.9
B
❒ link layer send datagram to B 223.1.2.2
223.1.1.3 223.1.3.27 E
inside link-layer frame
223.1.3.1 223.1.3.2
frame source, datagram source,
dest address dest address

B’s MAC A’s MAC A’s IP B’s IP


IP payload
addr addr addr addr

datagram
frame
ARP: Address Resolution Protocol

Question: how to determine ❒ Each IP node (Host,


MAC address of B Router) on LAN has
knowing B’s IP address? ARP table
❒ ARP Table: IP/MAC
address mappings for
some LAN nodes
< IP address; MAC address; TTL>
❍ TTL (Time To Live): time
after which address
mapping will be forgotten
(typically 20 min)
ARP protocol
❒ A wants to send datagram ❒ A caches (saves) IP-to-
to B, and A knows B’s IP MAC address pair in its
address. ARP table until information
❒ Suppose B’s MAC address becomes old (times out)
is not in A’s ARP table. ❍ soft state: information
❒ A broadcasts ARP query that times out (goes
packet, containing B's IP away) unless refreshed
address ❒ ARP is “plug-and-play”:
❍ all machines on LAN ❍ nodes create their ARP
receive ARP query tables without
❒ B receives ARP packet, intervention from net
replies to A with its (B's) administrator
MAC address
❍ frame sent to A’s MAC
address (unicast)
Routing to another LAN
walkthrough: send datagram from A to B via R
assume A know’s B IP address

R
B
❒ Two ARP tables in router R, one for each IP network (LAN)
❒ A creates datagram with source A, destination B
❒ A uses ARP to get R’s MAC address for 111.111.111.110
❒ A creates link-layer frame with R's MAC address as dest,
frame contains A-to-B IP datagram
❒ A’s data link layer sends frame
❒ R’s data link layer receives frame
❒ R removes IP datagram from Ethernet frame, sees its
destined to B
❒ R uses ARP to get B’s physical layer address
❒ R creates frame containing A-to-B IP datagram sends to B

R
B
Overview

❒ Error Detection: CRC


❒ Multiple access protocols
❒ LAN addresses and ARP
❒ Ethernet
Ethernet Frame Structure
Sending adapter encapsulates IP datagram (or other
network layer protocol packet) in Ethernet frame

Preamble:
❒ 7 bytes with pattern 10101010 followed by one
byte with pattern 10101011
❒ used to synchronize receiver, sender clock rates
Ethernet Frame Structure
(more)
❒ Addresses: 6 bytes
❍ if adapter receives frame with matching destination
address, or with broadcast address (eg ARP packet), it
passes data in frame to net-layer protocol
❍ otherwise, adapter discards frame
❒ Type: indicates the higher layer protocol, mostly
IP but others may be supported such as Novell
IPX and AppleTalk)
❒ CRC: checked at receiver, if error is detected, the
frame is simply dropped
Unreliable, connectionless service
❒ Connectionless: No handshaking between sending
and receiving adapter.
❒ Unreliable: receiving adapter doesn’t send acks or
nacks to sending adapter
❍ stream of datagrams passed to network layer can have
gaps
❍ gaps will be filled if app is using TCP
❍ otherwise, app will see the gaps
Ethernet uses CSMA/CD
❒ No slots ❒ Before attempting a
❒ adapter doesn’t transmit retransmission,
if it senses that some adapter waits a
other adapter is random time, that is,
transmitting, that is, random access
carrier sense
❒ transmitting adapter
aborts when it senses
that another adapter is
transmitting, that is,
collision detection

You might also like