Networking Mod 4 - 5 (copy)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/166

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:21 PM on 4/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

167 Terms

1
New cards

nodes

hosts and routers

2
New cards

links

communication channels that

connect adjacent nodes along

communication path

3
New cards

layer-2 packet

frame, encapsulates datagram

4
New cards

flow control

pacing between adjacent sending and

receiving node

5
New cards

error detection

• errors caused by signal attenuation, noise.

• receiver detects errors, signals

retransmission, or drops frame

6
New cards

error correction

receiver identifies and corrects bit error(s)

without retransmission

7
New cards

half-duplex and full-duplex

with half duplex, nodes at both ends of

link can transmit, but not at same time

8
New cards

sending side:

 encapsulates datagram in frame

 adds error checking bits, reliable data

transfer, flow control, etc.

9
New cards

receiving side:

 looks for errors, reliable data

transfer, flow control, etc.

 extracts datagram, passes to

upper layer at receiving side

10
New cards

single bit parity

detect single bit errors

11
New cards

two-dimensional bit parity:

detect and correct single bit errors

12
New cards

Even parity

set parity bit so there is an even number of 1’s

13
New cards

Internet checksum :sender

treat contents of UDP segment (including UDP header fields and IP addresses) as sequence of 16-bit integers

14
New cards

Internet checksum :sender

checksum: addition (one’s complement sum) of segment content

15
New cards

Internet checksum :sender

checksum value put into UDP checksum field

16
New cards

Internet checksum:receiver

compute checksum of received

segment

17
New cards

Internet checksum:receiver

check if computed checksum equals checksum field value: • not equal - error detected • equal - no error detected. But maybe errors nonetheless? More later

18
New cards

Cyclic Redundancy Check

 more powerful error-detection coding

 D: data bits (given, think of these as a binary number)

 G: bit pattern (generator), of r+1 bits (given)

19
New cards

point-to-point

• point-to-point link between Ethernet switch, host

• PPP for dial-up access

20
New cards

broadcast (shared wire or medium)

• old-fashioned Ethernet

• upstream HFC in cable-based access network

• 802.11 wireless LAN, 4G/4G. satellite

21
New cards

Multiple access protocols

 single shared broadcast channel

 two or more simultaneous transmissions by nodes: interference

22
New cards

collision

if node receives two or more signals at the same time

23
New cards

channel partitioning

• divide channel into smaller “pieces” (time slots, frequency, code)

• allocate piece to node for exclusive use

24
New cards

 random access

• channel not divided, allow collisions

• “recover” from collisions

25
New cards

taking turns

• nodes take turns, but nodes with more to send can take longer turns

26
New cards

TDMA: time division multiple access

 access to channel in “rounds”

 each station gets fixed length slot (length = packet transmission

time) in each round

 unused slots go idle

 example: 6-station LAN, 1,3,4 have packets to send, slots 2,5,6 idle

27
New cards

FDMA: frequency division multiple access

 channel spectrum divided into frequency bands

 each station assigned fixed frequency band

 unused transmission time in frequency bands go idle

 example: 6-station LAN, 1,3,4 have packet to send, frequency bands 2,5,6 idle

28
New cards

Random access protocols

 when node has packet to send

• transmit at full channel data rate R.

• no a priori coordination among nodes

 two or more transmitting nodes: “collision”

 random access MAC protocol specifies:

• how to detect collisions

• how to recover from collisions (e.g., via delayed retransmissions)

 examples of random access MAC protocols:

• ALOHA, slotted ALOHA

• CSMA, CSMA/CD, CSMA/CA

29
New cards

CSMA (carrier sense multiple access)

simple CSMA: listen before transmit:

• if channel sensed idle: transmit entire frame

• if channel sensed busy: defer transmission

 human analogy: don’t interrupt others!

30
New cards

CSMA/CD: CSMA with collision detection

• collisions detected within short time

• colliding transmissions aborted, reducing channel wastage

• collision detection easy in wired, difficult with wireless

31
New cards

CSMA: collisions

 collisions can still occur with

carrier sensing:

• propagation delay means two nodes

may not hear each other’s just-

started transmission

 collision: entire packet

transmission time wasted

• distance & propagation delay play

role in determining collision

probability

32
New cards

CSMA/CD

 CSMA/CD reduces the amount of

time wasted in collisions

• transmission aborted on collision

detection

33
New cards

channel partitioning MAC protocols

 share channel efficiently and fairly at high load

 inefficient at low load: delay in channel access, 1/N bandwidth

allocated even if only 1 active node!

34
New cards

random access MAC protocols

 efficient at low load: single node can fully utilize channel

 high load: collision overhead

35
New cards

“taking turns” protocols

 look for best of both worlds!

36
New cards

“Taking turns” MAC protocols

polling:

 master node “invites” other nodes

to transmit in turn

 typically used with “dumb”

devices

 concerns:

• polling overhead

• latency

• single point of failure (master)

37
New cards

token passing

 control token passed from one

node to next sequentially.

 token message

 concerns:

• token overhead

• latency

• single point of failure

(token)

38
New cards

multiple downstream (broadcast) FDM channels

up to 1.6 Gbps/channel

 single CMTS (cable modem termination system) transmits into channels

39
New cards
<p>multiple upstream channels (up to 1 Gbps/channel)</p>

multiple upstream channels (up to 1 Gbps/channel)

multiple access: all users contend (random access) for certain upstream

channel time slots; others assigned TDM

40
New cards

multiple access

all users contend (random access) for certain upstream

channel time slots; others assigned TDM

41
New cards

DOCSIS

data over cable service interface specificaiton

42
New cards

TDM upstream:

ome slots assigned, some have contention

43
New cards

32-bit IP address

• network-layer address for interface

• used for layer 3 (network layer) forwarding

• e.g.: 128.119.40.136

44
New cards

MAC (or LAN or physical or Ethernet) address

• function: used “locally” to get frame from one interface to another

physically-connected interface (same subnet, in IP-addressing sense)

• 48-bit MAC address (for most LANs) burned in NIC ROM, also

sometimes software settable

hexadecimal (base 16) notation

(each “numeral” represents 4 bits)

• e.g.: 1A-2F-BB-76-09-AD

45
New cards

MAC addresses

each interface on LAN

 has unique 48-bit MAC address

 has a locally unique 32-bit IP address (as we’ve seen)

46
New cards

MAC address: like

Social Security Number

47
New cards

IP address:like

postal address

48
New cards

MAC flat address: portability

• can move interface from one LAN to another

• recall IP address not portable: depends on IP subnet to which

node is attached

49
New cards

ARP table

each IP node (host,

router) on LAN has table

50
New cards

IP/MAC address mappings for

some LAN nodes

< IP address; MAC address; TTL>

51
New cards

TTL (Time To Live)

time after which address mapping will be forgotten (typically 20 min)

52
New cards

Ethernet

“dominant” wired LAN technology:

 first widely used LAN technology

 simpler, cheap

 kept up with speed race: 10 Mbps – 400 Gbps

 single chip, multiple speeds (e.g., Broadcom BCM5761)

53
New cards

bus

popular through mid 90s

• all nodes in same collision domain (can collide with each other)

54
New cards

switched

prevails today

• active link-layer 2 switch in center

• each “spoke” runs a (separate) Ethernet protocol (nodes do not collide with

each other)

55
New cards

connectionless

no handshaking between sending and

receiving NICs

56
New cards

unreliable

receiving NIC doesn’t send ACKs or NAKs to

sending NIC

57
New cards

Ethernet’s MAC protocol

unslotted CSMA/CD with binary

backoff

58
New cards

Switch

a link-layer device: takes an active role

59
New cards

Switch

• store, forward Ethernet frames

• examine incoming frame’s MAC address, selectively forward frame

to one-or-more outgoing links when frame is to be forwarded on

segment, uses CSMA/CD to access segment

60
New cards

transparent

hosts unaware of presence of switches

61
New cards

plug-and-play, self-learning

switches do not need to be configured

62
New cards

switch learns which hosts

can be reached through

which interfaces

• when frame received, switch

“learns” location of sender:

incoming LAN segment

• records sender/location pair

in switch table

63
New cards

Interconnecting switches

self-learning switches can be connected togethe

64
New cards

routers

network-layer devices (examine

network-layer headers)

compute tables using routing

algorithms, IP addresses

65
New cards

switches

ink-layer devices (examine

link-layer headers)

earn forwarding table using

flooding, learning, MAC addresses

66
New cards

single broadcast domain

 scaling: all layer-2 broadcast traffic

(ARP, DHCP, unknown MAC) must

cross entire LAN

 efficiency, security, privacy issues

67
New cards

port-based VLAN

witch ports grouped (by

switch management software) so that

single physical switch operates as multiple virtual switches

68
New cards

traffic isolation

frames to/from ports

1-8 can only reach ports 1-8

• can also define VLAN based on MAC

addresses of endpoints, rather than

switch port

69
New cards

dynamic membership

ports can be

dynamically assigned among VLANs

70
New cards

forwarding between VLANS

done via

routing (just as with separate switches)

• in practice vendors sell combined switches

plus routers

71
New cards

trunk port

carries frames between VLANS defined over multiple

physical switches

72
New cards

MPLS capable routers

 a.k.a. label-switched router

 forward packets to outgoing interface based only on label

value (don’t inspect IP address)

• MPLS forwarding table distinct from IP forwarding tables

flexibility: MPLS forwarding decisions can differ from

those of IP

• use destination and source addresses to route flows to same

destination differently (traffic engineering)

• re-route flows quickly if link fails: pre-computed backup path

73
New cards

IP routing

path to destination determined by destination address alone

74
New cards

MPLS routing

path to destination can be based on source and

destination address

75
New cards

MPLS signaling

modify OSPF, IS-IS link-state flooding protocols to carry info used

by MPLS routing:

• e.g., link bandwidth, amount of “reserved” link bandwidth

76
New cards

entry MPLS router uses

RSVP-TE signaling protocol to set up

MPLS forwarding at downstream routers

77
New cards

Datacenter networks

10’s to 100’s of thousands of hosts, often closely coupled, in

close proximity:

 e-business (e.g. Amazon)

 content-servers (e.g., YouTube, Akamai, Apple, Microsoft)

 search engines, data mining (e.g., Google)

78
New cards

Datacenter networks challenges

 multiple applications, each serving

massive numbers of clients

 reliability

 managing/balancing load, avoiding

processing, networking, data

bottlenecks

79
New cards

Border routers

connections outside datacenter

80
New cards

Tier-1 switches

connecting to ~16 T-2s below

81
New cards

Tier-2 switches

connecting to ~16 TORs below

82
New cards

Top of Rack (TOR) switch

 one per rack

 40-100Gbps Ethernet to blades

83
New cards

Server racks

20- 40 server blades: hosts

84
New cards

Datacenter networks: multipath

 rich interconnection among switches, racks:

• increased throughput between racks (multiple routing paths possible)

• increased reliability via redundancy

85
New cards

load balancer:

application-layer

routing

 receives external

client requests

 directs workload

within data center

 returns results to

external client

(hiding data center

internals from client)

86
New cards


Datacenter networks: protocol innovations
Link layer

RoCE: remote DMA (RDMA) over Converged Ethernet

87
New cards



Datacenter networks: protocol innovations

transport layer

• ECN (explicit congestion notification) used in transport-layer congestion

control (DCTCP, DCQCN)

• experimentation with hop-by-hop (backpressure) congestion control

88
New cards


Datacenter networks: protocol innovations

routing, management

• SDN widely used within/among organizations’ datacenters

• place related services, data as close as possible (e.g., in same rack or nearby

rack) to minimize tier-2, tier-1 communication

89
New cards

wireless

communication over wireless link

90
New cards

mobility

handling the mobile user who changes point of attachment to

network

91
New cards

wireless hosts

 laptop, smartphone, IoT

 run applications

 may be stationary (non-mobile) or mobile

92
New cards

base station

 typically connected to wired network

 relay - responsible for sending packets

between wired network and wireless

host(s) in its “area”

• e.g., cell towers, 802.11 access points

93
New cards

wireless link

 typically used to connect mobile(s) to

base station, also used as backbone link

 multiple access protocol coordinates link

access

 various transmission rates and distances,

frequency bands

94
New cards

infrastructure mode

 base station connects mobiles into

wired network

 handoff: mobile changes base station

providing connection into wired

network

95
New cards

ad hoc mode

 no base stations

 nodes can only transmit to

other nodes within link

coverage

 nodes organize themselves

into a network: route among

themselves

96
New cards

single hop

host connects to base station (WiFi, cellular) which connects to larger Internet

no base station, no connection to larger Internet (Bluetooth, ad hoc nets

97
New cards

multiple hops

host may have to relay through several wireless nodes to connect to larger Internet: mesh net

no base station, no connection to larger Internet. May have to relay to reach other a given wireless node MANET, VANET

98
New cards

Wireless link characteristics

decreased signal strength

radio signal attenuates

as it propagates through matter (path loss)

99
New cards

Wireless link characteristics

interference from other sources:

wireless network

frequencies (e.g., 2.4 GHz) shared by many devices

(e.g., WiFi, cellular, motors): interference

100
New cards

Wireless link characteristics

multipath propagation:

radio signal reflects off objects ground, arriving at destination at slightly different times