Ethernet Neil Tang 9/17/2008 CS440 Computer Networks.

Slides:



Advertisements
Similar presentations
Ethernet. Most successful local area networking technology of last 20 years. Developed in the mid-1970s by researchers at the Xerox Palo Alto Research.
Advertisements

The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 5 – Collision management.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
CSC 450/550 Part 3: The Medium Access Control Sublayer.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 4 – Ethernet frame.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
Spring 2006CS 3321 Chapter 2 Tidbits Outline A little hardware Ethernet Realistic data transfer rates.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
Lecture 9: Ethernet and Token Ring Networks
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 Ethernet History –developed by Xerox PARC in mid-1970s –roots in Aloha packet-radio network –standardized by Xerox, DEC, and Intel in 1978 –similar to.
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
1 University of Calgary CS 441 Part 4 Medium Access Control 4.1 MAC Sublayer - CSMA 4.2 MAC Sublayer - Collision Free.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Fundamentals of Computer Networks ECE 478/578 Lecture #11: Ethernet Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of.
Network Communications Chapter 8 Ethernet and IEEE Networking Technology.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
CS380 Int. to Comp. Networks Data Link Networks - Part II1 Reliable Transmission How to fix corrupted frames. –Error correcting codes too expensive –Should.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Link Layer 5.1 Introduction and services
Week3 The Medium Access Sublayer
The University of Adelaide, School of Computer Science
CS4470 Computer Networking Protocols
Advanced Computer Networks
Networks Lecture 7.
High Speed LANs – Ethernet and Token Ring
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
CS 457 – Lecture 6 Ethernet Spring 2012.
Services of DLL Framing Link access Reliable delivery
Outline A little hardware Ethernet Realistic data transfer rates
Ethernet – CSMA/CD Review
Token Ring Neil Tang 9/22/2008 CS440 Computer Networks.
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
Computer Interfacing and Protocols
Ethernet 16EC351 Computer networks unit II Mr.M.Jagadesh,AP/ECE.
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Chapter 6 Multiple Radio Access.
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
Distributed Systems 6. Medium Access Control Sublayer
Presentation transcript:

Ethernet Neil Tang 9/17/2008 CS440 Computer Networks

Outline Major Concern for MAC Design Basic Architecture Physical Properties MAC Protocol Strengths and Weaknesses CS440 Computer Networks

Major Concerns for MAC Design Throughput Fairness CS440 Computer Networks

Ethernet (802.3) Basic Architecture: multiple hosts share a physical medium. MAC Protocol: CSMA/CD CS440 Computer Networks

Basic Architecture CS440 Computer Networks

Physical Properties Broadcast: Any signal placed on Ethernet is broadcast. Encoding: Manchester Error Detection: CRC Physical Distance: 2500m Number of Hosts: 1024 Data Rate: 10Mbps/100Mbps, 1Gbps Cables: 10Base2(200m), 10Base5(500m), 10BaseT(100m) CS440 Computer Networks

Frame Format Min/Max Body Size: 46/1500 bytes CS440 Computer Networks

Addressing 48-bit Address: e.g., 08:00:2b:e4:b1:02 The address is burned to the ROM of each adaptor. Every adaptor has a world-wide unique address. Each manufacturer is allocated a different prefix. CS440 Computer Networks

MAC Algorithm In the receiver The receiver in an adaptor receives all frames but only accepts: frames addressed to its own address frames addressed to the broadcast address (FF:FF:FF:FF:FF:FF) Frames addressed to a multicast address (e.g., 01:00:5E:80:00:00 -01:00:5E:FF:FF:FF (reserved by IANA)), if it is in that multicast group All frames, if it is placed in promiscuous mode. CS440 Computer Networks

MAC Algorithm In the transmitter If it has data to send and the line is busy, it waits for the line to go idle and transmit immediately. At the moment it detects collision, it transmits a 32-bit jamming sequence and stops transmission. It waits a “certain” amount of time and tries again. It uses binary exponential backoff, delay k  51.2μs , where k=0…2n-1(random selection). CS440 Computer Networks

MAC Algorithm 1-persistent Vs. p-persistent 1-persistent protocol (Ethernet): It transmits once the medium is idle p-persistent protocol (Aloha): It transmits with probability p and defers until next empty time with probability q=1-p. Make the same decision next time. CS440 Computer Networks

MAC Algorithm Why min frame length 512 bits Worst case propagation round trip delay (2500m, 4 repeaters) = 51.2 μs Transmission time = 512/10M = 51.2 μs CS440 Computer Networks

Strength and Weakness Strength: Weakness: Simple: No routing, no switching and very simple MAC protocol. Low Cost: Cheap cables and cheap equipments Weakness: Inefficient in Throughput: Under heavy traffic condition, collisions happen frequently. CS440 Computer Networks