Download pptx - Caltech

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Deep packet inspection wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Network tap wikipedia , lookup

Computer network wikipedia , lookup

RapidIO wikipedia , lookup

AppleTalk wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

IEEE 1355 wikipedia , lookup

Telephone exchange wikipedia , lookup

Wake-on-LAN wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Point-to-Point Protocol over Ethernet wikipedia , lookup

Power over Ethernet wikipedia , lookup

Spanning Tree Protocol wikipedia , lookup

Transcript
cs/ee 143 Communication Networks
Chapter 3 Ethernet
Text: Walrand & Parakh, 2010
Steven Low
CMS, EE, Caltech
Warning
These notes are not self-contained,
probably not understandable,
unless you also were in the lecture
They are supplement to not replacement for class attendance
Agenda
Ethernet history/devices
Switch Ethernet forwarding table
Spanning tree protocol
Little’s theorem (informal proof)
Ethernet
Each (layer 2) network
• full connectivity: every node can reach every other node
• broadcast capable: every node (inc. router) can broadcast to all other nodes
• e.g. Ethernet, WiFi, cable network, etc.
Aloha network (1970)
Randomized multiple access
• Send on frequency f1; receive ack on frquency f2.
• If no ack after timeout, wait a random time and re-transmit
Aloha network (1970)
Randomized multiple access
• If an ack is not outstanding, transmit immediately
• If no ack, re-transmit after a random delay
Aloha network (1970)
Randomized multiple access
Max utilization (prob of success) ~ 1/e ~ 37%
Slotted Aloha utilization
Model
• Slotted time, fixed packet size, n stations
• 1 slot = 1 pkt transmission time
• In each slot, each station transmits
independently with probability p
Prob (slot t has a successful transmission)
R(p) = np (1- p)
n-1
Slotted Aloha utilization
max R( p) = np (1- p)
n-1
p
Þ 0 = R'( p ) = n (1- p
*
Þ
(1- p ) = (n -1)p
*
)
* n-1
*
- n(n -1)p (1- p
*
1
Þ p =
n
*
max utilization = R(p )
*
n-1
æ 1ö
= ç1- ÷
è nø
1
®
e
as n ® ¥
)
* n-2
Slotted Aloha utilization
max R( p) = np (1- p)
n-1
p
Þ 0 = R'( p ) = n (1- p
*
Þ
(1- p ) = (n -1)p
*
)
* n-1
*
- n(n -1)p (1- p
*
1
Þ p =
n
*
max utilization = R(p )
*
n-1
æ 1ö
= ç1- ÷
è nø
1
®
e
as n ® ¥
)
* n-2
Slotted Aloha utilization
max R( p) = np (1- p)
n-1
p
Þ 0 = R'( p ) = n (1- p
*
Þ
(1- p ) = (n -1)p
*
)
* n-1
*
- n(n -1)p (1- p
*
1
Þ p =
n
*
max utilization = R(p )
*
n-1
æ 1ö
= ç1- ÷
è nø
1
®
e
as n ® ¥
)
* n-2
Unslotted Aloha utilization
Model
• Fixed packet size, n stations
• Slotted time of duration t << 1.
• pkt transmission time lasts 1/t time slots
• In each t-slot, each station transmits
independently with probability p
• Small t => approximates unslotted operation
Prob (slot t has a successful transmission)
R(p) = np (1- p)
n-1
Unslotted ALOHA utilization
Prob (a pkt transmission started in an arbitrary
t-slot by station 1 is successful)
n-1
n-1
( n-1) K
S(p) = p (1- p)
(1- p)
2
K:= -1 time slots
t
= p (1- p)
Unslotted ALOHA utilization
Prob (a pkt transmission started in an arbitrary
t-slot by station 1 is successful)
n-1
n-1
( n-1) K
S(p) = p (1- p)
(1- p)
2
K:= -1 time slots
t
= p (1- p)
Unslotted ALOHA utilization
max S( p) = p (1- p)
( n-1) K
p
Þ
0 = S '( p ) = (1- p
*
*
)
( n-1) K
- (n -1)Kp (1- p
*
Þ
(1- p ) = (n -1)Kp
*
1
Þ p =
(n -1)K +1
*
*
*
)
( n-1) K-1
Unslotted ALOHA utilization
max S( p) = p (1- p)
( n-1) K
p
Þ
0 = S '( p ) = (1- p
*
*
)
( n-1) K
- (n -1)Kp (1- p
*
Þ
(1- p ) = (n -1)Kp
*
1
Þ p =
(n -1)K +1
*
*
)
( n-1) K-1
*
reduces to slotted case
If K=1
Unslotted ALOHA utilization
n
*
utilization := S( p )
t
( n-1) K
æ
ö
n
1
1
=
ç1÷
t (n -1)K +1 è (n -1)K +1 ø
( n-1) K
æ
ö
n
1
1
=
1ç
÷
n -1 t K + t è (n -1)K +1 ø
n -1
1
tk = 2 -t
®
as n ® ¥ and t ® 0
2e
Unslotted ALOHA utilization
n
*
utilization := S( p )
t
( n-1) K
æ
ö
n
1
1
=
ç1÷
t (n -1)K +1 è (n -1)K +1 ø
( n-1) K
æ
ö
n
1
1
=
1ç
÷
n -1 t K + t è (n -1)K +1 ø
n -1
1
t K = 2 -t
®
as n ® ¥ and t ® 0
2e
Unslotted ALOHA utilization
n
*
utilization := S( p )
t
( n-1) K
æ
ö
n
1
1
=
ç1÷
t (n -1)K +1 è (n -1)K +1 ø
( n-1) K
æ
ö
n
1
1
=
1ç
÷
n -1 t K + t è (n -1)K +1 ø
n -1
1
t K = 2 -t
®
as n ® ¥ and t ® 0
2e
Ethernet cable (1973-76)
CSMA/CD (carrier sensing multiple access/collision detection)
1. Wait till channel is idle; wait for a random time.
2. Transmit when the channel is idle following the random wait.
3. Abort if collision is detected, and goto 1.
Ethernet cable (1973-76)
Truncated binary exponential backoff
1. Pick X uniformly at random from {0, 1, ..., 2^n-1}, n = min (10, m), m =
#collisions. Give up & declare error when m = 16.
2. Wait X x 512 bit times (4,096 bits for 1G)
3. If collide, increment m and repeat.
Ethernet cable (1973-76)
Capture or winner-takes-all effect
• A station that collides is more likely to pick a larger random backoff
time.
• A station that successfully transmits is more likely to pick a smaller
backoff time and hence more likely to successfully transmit again
Ethernet hub (1980s)
CSMA/CD as in Ethernet cable
Ethernet hub (1980s)
• A station waits a random multiples of T = 2 PROP before transmitting
• When n stations transmit independently with prob p, then prob of success is
<= 1/e when n is large
• Hence avg time till first success = e T
• Utilization = TRANS / (TRANS + (e-1)T) = 1 / (1 + 3.4A), A = PROP/TRAN
Ethernet switch
Ethernet switch eliminates collision, provided
switch buffer is big enough.
Ethernet switch: forwarding table
(Ethernet) MAC address
1. 48 bit
2. Globally unique to MAC device, location independent (c.f. IP)
3. Broadcast address: 48 ones
Ethernet switch: forwarding table
x  y:
[ y | x | data ]
Agenda
Ethernet history/devices
Switch Ethernet forwarding table
Spanning tree protocol
Little’s theorem (informal proof)
Ethernet switch routing: STP
•
•
•
•
Goal
Operation
Example
Performance
x  y:
[ y | x | data ]
Spanning tree protocol
Goal: for all switches in a LAN to
compute a shortest-path tree
 used to route layer-2 packets
 one tree for entire LAN
 rooted at the switch with the smallest ID
(MAC address)
 decentralized, asynchronous, robust
computation
Spanning tree protocol
Three criteria
1. The root switch always forwards messages
on all its ports
2. Each switch computes its shortest path (in
#bridges) to root
3. All switches connected to a LAN elect a
designated switch for the LAN to send
packets towards root switch
 A switch that is not elected for any of the LANs it
is connected to will not receive nor forward any
data packet
Spanning tree protocol
 Switches send packets asynchronously with
[ my ID | current root ID | distance to root ]
 A switch relays packets whose “current root ID”
is the smallest it has seen so far (& smaller
than its own “current root ID”), and adds 1 to
“distance to root”
 If the “distances to root” on STP packets
received by a switch on all its ports are the
same or smaller than what it believes its
distance is, then the switch stops forwarding
 … until protocol converges
Completely decentralized, asynchronous, robust
STP: example
I’m 3
I think root is 3
my distance to root is 0
STP: example
I’m 3
I think root is 3
my distance to root is 0
STP: example
a new initiation
before previous
converges
STP: example
a new initiation
before previous
converges
STP: example
a new initiation
before previous
converges
STP: example
During transient, B5 may connect to root B1
either via B3 or B4 – which should B5 use?
Ans: use switch with a smaller ID (B3)
Spanning tree for all switches
x  y:
[ y | x | data ]
STP: designated switches
• B4 believes its distance to root B1 is 2
• The STP packets from both its ports have distances equal or less. So
it does not forward and is not a designated switch for neither LAN
• Neither B4 nor B5 will be involved in forwarding data packets
Spanning tree protocol
Performance
 Unique path between every sourcedestination path
 Can potentially be bad since 2 switches
may communicate only via root
 e.g. in a ring of switches, the switch with the
largest ID communicates with root via the
longest path
 Penalty is usually not too bad since it is
in a LAN
Agenda
Ethernet history/devices
Switch Ethernet forwarding table
Spanning tree protocol
Little’s theorem (informal proof)
Little’s law
L = T
capacity:
m pkts/s (>l )
arrival rate:
l pkts/s
L pkts
Little’s law
at
L (t )
Ti
bt
t
t
at : #packets arrived by t
bt : #packets departed by t
Ti : delay of packet i
Lt = a t - bt : #packets in system at t
Little’s law
at
L (t )
Ti
bt
t
t
ò L (t )dt
0
t
Little’s law
at
L (t )
Ti
bt
t
bt
åT
i
i=1
£
t
ò L (t )dt
0
t
Little’s law
at
L (t )
Ti
bt
t
bt
åT
i
i=1
t
£
t
ò L (t )dt
0
£
at
åT
i
i=1
Little’s law
at
L (t )
Ti
bt
t
bt
åT
i
£
i=1
bt
t
bt 1
Ti £
å
t bt i=1
t
ò L (t )dt
0
t
1
L (t )dt
ò
t 0
£
at
åT
i
i=1
at
at 1
£
Ti
å
t a t i=1
Little’s law
at
L (t )
Ti
bt
t
t
l
T
bt
£
bt 1
Ti £
å
t bt i=1
L
£ l
­ as t ® ¥
t
1
L (t )dt
ò
t 0
T
at
at 1
£
Ti
å
t a t i=1
Queueing system
random arrival
process with rate

with average
 pkts/s
 Little’s law
random service time
1

s/pkt
L = T
 Verifies directly for M/M/1, but holds
much more generally
 Extremely useful because of its
generality
M/M/1 queue
Poisson arrival
process with rate
Exponential service time

with average
 pkts/s
1
avg total delay T =
 -
/
avg waiting time Tq = T - =
  -
1
avg # pkts in system L =

 -
1

s/pkt
Queueing system
random arrival
process with rate
random service time

with average
 pkts/s
L
L = T
T
Tq = T -
Lq
Lq = Tq
Tq
1

1

s/pkt