a review of evolving network technology ethernet & ip j.j. ekstrom march 2008

46
A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Upload: nigel-franklin

Post on 30-Dec-2015

220 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

A Review of Evolving Network Technology

Ethernet & IP

J.J. EkstromMarch 2008

Page 2: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Who is winning? Ethernet has won the LAN wars Ethernet is winning the MAN wars

– IProvo, Utopia… 10X bandwidth same price. Ethernet is contending for part of the WAN… PPOE (Point to Point

over Ethernet) IP has won all best-effort wars wars…

– Most ATM traffic is IP– A large portion of Sonet Traffic is IP– MPLS is taking over the core to optimize IP

IETF and Vendors making IP transport of choice for future– Voice over IP – IP Multicast Streaming

Page 3: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Why?

Simple transports Work faster and cheaper Put the smarts where it can work for more

transports Not as much advantage to smarter

transports

Page 4: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Historical View: Ethernet Characteristics

Ethernet shared media cable Cable access method (CSMA/CD) Unreliable Packet Delivery Assumes higher layers do most of the work Simple and Relatively fast on whatever

physical transport with any generation of hardware.

Page 5: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Ethernet Shared Media Cable 1

Physics determined the maximum length of the Ethernet cable– signal strength– cable characteristics

Page 6: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Ethernet Shared Media Cable 2

All stations (nodes) hook to, and share a single cable

Page 7: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Ethernet Shared Media Cable 3

Each station “listens” as it transmits

Page 8: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Ethernet Shared Media Cable 4

Each station must transmit a minimum of 64 bytes to “fill” the cable before it stops listening

64 bytes min.

Page 9: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Ethernet Shared Media Cable 5

If a 2nd node transmits before the 1st node finishes, the two transmissions collide and they must retransmit

64 bytes min. 64 bytes min.

Page 10: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Ethernet Cable Access Method (CSMA/CD)

CSMA/CD is a media-access method used by Ethernet and 802.3 networks

CSMA/CD stands for Carrier Sense, Multiple Access / Collision Detection

Page 11: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

How CSMA/CD Works - 1

A station wishing to transmit first listens for traffic on the cable indicated by a carrier signal (CSMA/CD-Carrier Sense)

Network Cable Carrier Signal

Page 12: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

How CSMA/CD Works - 2

If the carrier signal is detected, the station waits a period of time and tries again

Network Cable Carrier Signal

Page 13: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

How CSMA/CD Works - 3

If NO carrier signal is detected, the station starts transmitting its packet (min. of 64 bytes) and simultaneously listening

Network CableM

IN. O

F 6

4 B

YTE

S

Page 14: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

How CSMA/CD Works - 4

TWO stations can start transmitting at the same time (CSMA/CD - Multiple Access)

Network Cable

MIN

. O

F 6

4 B

YTE

S

MIN

. O

F 6

4 B

YTE

S

Page 15: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

How CSMA/CD Works - 5

If this happens, both stations hear garbage (CSMA/CD - Collision Detection)

Network Cable

MIN

. O

F 6

4 B

YTES

MIN

. O

F 6

4 B

YTES@&*!

Page 16: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

How CSMA/CD Works - 6

When collisons are detected, both stations :– cancel transmissions by sending a jam signal– wait a random amount of time before trying to

transmit again

Network Cable

JAM

SIG

NA

L

JAM

SIG

NA

L

Page 17: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

PROBLEM #1

Physics doesn’t allow you to have LAN wires as long as you would like.

Page 18: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

SOLUTION #1

Repeater extended wire length, broadcast domain, and collision domain

Repeater

Page 19: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

PROBLEM #2

Too many collisions. LAN wouldn’t carry enough traffic.

Page 20: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

SOLUTION #2

Bridging segments extends broadcast domain without collisions: Bigger LANs

BRIDGE

Page 21: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

PROBLEM #3 Broadcast storms - result from multi-port

bridges “flooding” all ports when packet destination is unknown and a loop exists.

BRIDGE 1

BRIDGE 3 BRIDGE 2

64 bytes min.

Packet returningto original bridge

Page 22: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

PROBLEM #3– when the original packet returns to a previous

bridge, new packets are generated and a “storm” is generated.

BRIDGE

BRIDGE BRIDGE

Cycle Repeats

Page 23: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

SOLUTION #3

3.1 - 802.1D (spanning tree) installed on bridges.

3.2 - Routers

Page 24: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

SOLUTION #3.1

802.1D (Spanning Tree) added to bridges. – Spanning Tree is an algorithm that runs on

bridges to eliminate loops dynamically.

802.1DBRIDGE 1

802.1DBRIDGE 3

802.1DBRIDGE 2

64 bytes min.

802.1D (SpanningTree) determines thatthis link is redundant

and shuts it down

Page 25: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

SOLUTION #3.2 Routers - make every segment another

network or subnet by refusing to pass through any packet whose address it does not recognize.

BRIDGE 1

BRIDGE 2

64 bytes min.

RouterBRIDGE 3

Page 26: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

SOLUTION #3.2 NOTE:

– in XNS a single broadcast domain is called a “network.”

– in TCP a single broadcast domain is called a “subnet.”

– network personnel often call a collision domain a “segment.”

Page 27: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

PROBLEM #4 Topology and failure characteristics -

problems with bus-oriented LANs (i.e., when the wire breaks NONE of the stations can communicate).

Page 28: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

SOLUTION #4

Twisted pair LANs.– When any one wire segment fails, the whole

LAN does NOT go down.

Concentrator ConcentratorBridge

Concentrator

Page 29: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

PROBLEM #5

Not enough Bandwidth– only 10 MBPS available on each collision

domain

BRIDGE

BRIDGE

BRIDGEConcentrator

Concentrator

Concentrator

Page 30: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

SOLUTION #5

Switches (multiport Bridges) - allows more segments (bandwidth) at a lower cost per port.

Concentrator

Concentrator

SWITCH

Page 31: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

PROBLEM #6

Controlling User Connectivity– keep groups separate– easily share resources between groups– do adds, moves, and changes without rewiring

Page 32: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

SOLUTION #6 VLANs of various forms create isolated

broadcast domains (networks) Connection between Virtual LAN networks

requires a router. People do security in their routers and

firewalls at network boundaries anyway

Page 33: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Problem #7

During roughly the same 20-25 year period Token-Ring LANs, FDDI, ATM, and several other LAN and WAN technologies have been undergoing similar evolutionary tracks as ethernet.

It was not clear that there would be a clear winner. How do you hook them together and protect your

technology investments? Users don’t care how their bits get pushed around,

only that things work.

Page 34: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Solution #7

Internetworking…The real reason IP has won the protocol wars.– Works well on P2P links

– Works well on LANs

– Makes very few demands of participant networks

– “Rough consensus and working code” Motto of the IETF The way to get useful things quickly in a world of confusion…

what works best wins.

Page 35: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Internetworking

Outline Best Effort Service ModelGlobal Addressing Scheme

Page 36: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

IP Internet

Concatenation of Networks

Protocol Stack

R2

R1

H4

H5

H3H2H1

Network 2 (Ethernet)

Network 1 (Ethernet)

H6

Network 3 (FDDI)

Network 4(point-to-point)

H7 R3 H8

R1

ETH FDDI

IPIP

ETH

TCP R2

FDDI PPP

IP

R3

PPP ETH

IP

H1

IP

ETH

TCP

H8

Page 37: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Service Model Connectionless (datagram-based) Best-effort delivery (unreliable service)

– packets are lost– packets are delivered out of order– duplicate copies of a packet are delivered– packets can be delayed for a long time– (Sound like Ethernet?)

Datagram format Version HLen TOS Length

Ident Flags Offset

TTL Protocol Checksum

SourceAddr

DestinationAddr

Options (variable) Pad(variable)

0 4 8 16 19 31

Data

Page 38: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Fragmentation and Reassembly

Each network has some MTU Strategy

– fragment when necessary (MTU < Datagram)– try to avoid fragmentation at source host– re-fragmentation is possible – fragments are self-contained datagrams– use CS-PDU (not cells) for ATM– delay reassembly until destination host– do not recover from lost fragments

Page 39: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Example

H1 R1 R2 R3 H8

ETH IP (1400) FDDI IP (1400) PPP IP (512)

PPP IP (376)

PPP IP (512)

ETH IP (512)

ETH IP (376)

ETH IP (512)

Ident = x Offset = 0

Start of header

0

Rest of header

1400 data bytes

Ident = x Offset = 0

Start of header

1

Rest of header

512 data bytes

Ident = x Offset = 512

Start of header

1

Rest of header

512 data bytes

Ident = x Offset = 1024

Start of header

0

Rest of header

376 data bytes

Page 40: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Global Addresses Properties

– globally unique– hierarchical: network + host

Dot Notation– 10.3.2.4– 128.96.33.81– 192.12.69.77

Network Host

7 24

0A:

Network Host

14 16

1 0B:

Network Host

21 8

1 1 0C:

Page 41: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Datagram Forwarding Strategy

– every datagram contains destination’s address– if directly connected to destination network, then forward to host– if not directly connected to destination network, then forward to

some router– forwarding table maps network number into next hop– each host has a default router– each router maintains a forwarding table

Example (R2) Network Number Next Hop 1 R3 2 R1 3 interface 1 4 interface 0

Page 42: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Address Translation Map IP addresses into physical addresses

– destination host– next hop router

Techniques– encode physical address in host part of IP address– table-based

ARP– table of IP to physical address bindings– broadcast request if IP address not in table– target machine responds with its physical address– table entries are discarded if not refreshed

Page 43: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

ARP Details

Request Format– HardwareType: type of physical network (e.g., Ethernet)– ProtocolType: type of higher layer protocol (e.g., IP)– HLEN & PLEN: length of physical and protocol addresses– Operation: request or response – Source/Target-Physical/Protocol addresses

Notes– table entries timeout in about 10 minutes– update table with source when you are the target – update table if already have an entry– do not refresh table entries upon reference

Page 44: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

ARP Packet Format

TargetHardwareAddr (bytes 2 – 5)

TargetProtocolAddr (bytes 0 – 3)

SourceProtocolAddr (bytes 2 – 3)

Hardware type = 1 ProtocolType = 0x0800

SourceHardwareAddr (bytes 4 – 5)

TargetHardwareAddr (bytes 0 – 1)

SourceProtocolAddr (bytes 0 – 1)

HLen = 48 PLen = 32 Operation

SourceHardwareAddr (bytes 0 – 3)

0 8 16 31

Page 45: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Internet Control Message Protocol (ICMP)

Echo (ping) Redirect (from router to source host) Destination unreachable (protocol, port, or host) TTL exceeded (so datagrams don’t cycle forever) Checksum failed Reassembly failed Cannot fragment

Page 46: A Review of Evolving Network Technology Ethernet & IP J.J. Ekstrom March 2008

Summary