1 15-441 Computer Networks Ethernet I Professor Hui Zhang

Slides:



Advertisements
Similar presentations
LAN Technologies LAN TECHNOLOGIES.
Advertisements

Topic 7 Local Area Networks (LAN)
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
1 Lecture 7 Datalink – Ethernet, Home David Andersen School of Computer Science Carnegie Mellon University Networking, Spring 2005
Ethernet Kenneth Castelino. Network Architecture - Protocols Physical: Actual signal transmission Data-Link: Framing / Error Detection Network: Routing.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
EECC694 - Shaaban #1 lec #6 Spring Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: –Computers connected by communication.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
Chapter 15: LAN Systems Business Data Communications, 4e.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Broadcast network access control Some slides used.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
CSC 311 IEEE STANDARD ETHERNET Common Bus topology Uses CSMA/CD Named after “ether”, the imaginary substance many once believed occupied all of space.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
CS 640: Introduction to Computer Networks
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
CSCI 465 D ata Communications and Networks Lecture 21 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 6 - Ethernet, Multiple Access and Bridging.
Multiple Access Readings: Kurose & Ross, 5.3, 5.5.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Computer Networks Lecture 6 Link-Layer (2) Dave Eckhardt.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Ch. 16 Ethernet Traditional Ethernet IEEE Medium Access Control –Carrier Sense Multiple Access with Collision Detection (CSMA/CD) –The most.
ETHERNET Yash Vaidya. Introduction Ethernet is a family of computer networking technologies for local area networks (LANs). Ethernet was commercially.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
High Speed LANs – Ethernet and Token Ring
CS 457 – Lecture 6 Ethernet Spring 2012.
Services of DLL Framing Link access Reliable delivery
COMP/ELEC 429/556 Introduction to Computer Networks
Protocol layering and data
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Business Data Communications, 4e
Protocol layering and data
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
LAN Technologies LAN TECHNOLOGIES.
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
Presentation transcript:

Computer Networks Ethernet I Professor Hui Zhang

2 Hui Zhang Aloha Network

3 Hui Zhang Original Ethernet

4 Hui Zhang High Level View  Goal: share a communication medium among multiple hosts connected to it  Problem: arbitrate between connected hosts  Solution goals:  High resource utilization  Avoid starvation  Simplicity (non-decentralized algorithms)

5 Hui Zhang Medium Access Protocols  Channel partitioning  Divide channel into smaller “pieces” (e.g., time slots, frequency)  Allocate a piece to node for exclusive use  Random access  Allow collisions  “recover” from collisions  Taking-turns  Tightly coordinate shared access to avoid collisions

6 Hui Zhang Random Access Protocols  When node has packet to send  Transmit at full channel data rate R.  No a priori coordination among nodes  Two or more transmitting nodes -> “collision”,  Random access MAC protocol specifies:  How to detect collisions  How to recover from collisions  Examples of random access MAC protocols:  Aloha  Slotted ALOHA  CSMA and CSMA/CD

7 Hui Zhang Aloha  Time is divided into equal size slots (= packet transmission time)  Node with new arriving pkt: transmit  If collision: retransmit pkt in future slots with probability p, until successful.

8 Hui Zhang Aloha  Nodes sends the message when it has data to send.  If it receives an ack, it considers the transmission completed, otherwise it retransmits after a random delay.  Simple, distributed protocol, but not very efficient  18% maximum utilization  Slotted Aloha: more efficient.  Reduces chances of collision  37% maximum utilization Central Computer

9 Hui Zhang Slotted Aloha  Time is divided into equal size slots (= packet transmission time)  Node with new arriving pkt: transmit at beginning of next slot  If collision: retransmit pkt in future slots with probability p, until successful. Success (S), Collision (C), Empty (E) slots

10 Hui Zhang CSMA/CD Broadcast technology  Carrier-sense multiple access with collision detection (CSMA/CD).  MA = multiple access  CS = carrier sense  CD = collision detection host hub

11 Hui Zhang CSMA/CD Algorithm  Sense for carrier.  If carrier present, wait until carrier ends.  Sending would force a collision and waste time  Send packet and sense for collision.  If no collision detected, consider packet delivered.  Otherwise, abort immediately, perform “exponential back off” and send packet again.  Start to send at a random time picked from an interval  Length of the interval increases with every retransmission

12 Hui Zhang Collision Detection Time ABC

13 Hui Zhang Collision Detection: Implications  All nodes must be able to detect the collision.  Any node can be sender  The implication is that either we must have a short wires, or long packets.  Or a combination of both  Can calculate length/distance based on transmission rate and propagation speed.  Messy: propagation speed is media- dependent, low-level protocol details,..  Minimum packet size is 64 bytes –Cable length ~256 bit times  Example: maximum coax cable length is 2.5 km ABC

14 Hui Zhang CSMA/CD: Some Details  When a sender detects a collision, it sends a “jam signal”.  Make sure that all nodes are aware of the collision  Length of the jam signal is 32 bit times  Exponential backoff operates in multiples of 512 bit times.  Longer than a roundtrip time  Guarantees that nodes that back off longer will notice the earlier retransmission before starting to send

15 Hui Zhang Ethernet Frame Format  Preamble marks the beginning of the frame.  Also provides clock synchronization  Source and destination are 48 bit IEEE MAC addresses.  Flat address space  Hardwired into the network interface  Type field is a demultiplexing field.  What network layer (layer 3) should receive this packet?  Is actually a length field in the standard  CRC for error checking. PreambleTypePadDestSourceDataCRC 86624

16 Hui Zhang Minimum Packet Size  Why put a minimum packet size?  Give a host enough time to detect collisions  In Ethernet, minimum packet size = 64 bytes (two 6-byte addresses, 2-byte type, 4-byte CRC, and 46 bytes of data)  If host has less than 46 bytes to send, the adaptor pads (adds) bytes to make it 46 bytes  What is the relationship between minimum packet size and the length of the LAN?

17 Hui Zhang Minimum Packet Size (more) propagation delay (d) a) Time = t; Host 1 starts to send frame Host 1Host 2 propagation delay (d) Host 1Host 2 b) Time = t + d; Host 2 starts to send a frame just before it hears from host 1’s frame propagation delay (d) Host 1Host 2 c) Time = t + 2*d; Host 1 hears Host 2’s frame  detects collision LAN length = (min_frame_size)*(light_speed)/(2*bandwidth) = = (8*64b)*(2*10 8 mps)/(2*10 7 bps) = 5.12 km

18 Hui Zhang Ethernet Physical Layer  10Base2 standard based on thin coax.  Thick coax no longer used  Nodes are connected using thin coax cables and “T” connectors in a bus topology  10-BaseT uses twisted pair and hubs.  Hub acts as a concentrator  The two designs have the same protocol properties.  Key: electrical connectivity between all nodes  Deployment is different host Hub Host

19 Hui Zhang Ethernet Technologies: 10Base2  10: 10Mbps; 2: under 200 meters max cable length  Thin coaxial cable in a bus topology  Repeaters used to connect up to multiple segments  Repeater repeats bits it hears on one interface to its other interfaces: physical layer device only!

20 Hui Zhang 10BaseT and 100BaseT  10/100 Mbps rate; later called “fast ethernet”  T stands for Twisted Pair  Hub to which nodes are connected by twisted pair, thus “star topology”

21 Hui Zhang 802.3u Fast Ethernet  Apply original CSMA/CD medium access protocol at 100Mbps  Must change either minimum frame or maximum diameter: change diameter  Requires  2 UTP5 pairs (4B5B) or  4 UTP3 pairs (8B6T) or  1 fiber pair  No more “shared wire” connectivity.  Hubs and switches only  4B/5B encoding

22 Hui Zhang Gbit Ethernet  Use standard Ethernet frame format  Allows for point-to-point links and shared broadcast channels  In shared mode, CSMA/CD is used; short distances between nodes to be efficient  Uses hubs, called here “Buffered Distributors”  Full-Duplex at 1 Gbps for point-to-point links

23 Hui Zhang Traditional IEEE 802 Networks: MAC in the LAN and MAN  Ethernet defined as IEEE  Not quite identical  The IEEE 802.* set of standards defines a common framing and addressing format for LAN protocols.  Simplifies interoperability  Addresses are 48 bit strings, with no structure  (Ethernet)  (Token ring)  802.X (Token bus)  (Distributed queue dual bus)  (Wireless)

24 Hui Zhang LAN Properties  Exploit physical proximity.  Typically there is a limitation on the physical distance between the nodes, for example, –to collect collisions in a contention based network –to limit the overhead introduced by token passing or slot reservations  Relies on single administrative control and some level of trust.  Broadcasting packets to everybody and hoping everybody (other than the receiver) will ignore the packet  Token passing protocols assume everybody plays by the rules

25 Hui Zhang Why Ethernet?  Easy to manage.  You plug in the host and it basically works  No configuration at the datalink layer  Broadcast-based.  In part explains the easy management  Some of the LAN protocols (e.g. ARP) rely on broadcast –Networking would be harder without ARP  Not having natural broadcast capabilities adds complexity to a LAN –Example: ATM  Drawbacks.  Broadcast-based: limits bandwidth since each packets consumes the bandwidth of the entire network  Distance

26 Hui Zhang 802.3z Gigabit Ethernet  Same frame format and size as Ethernet.  This is what makes it Ethernet  Full duplex point-to-point links in the backbone are likely the most common use.  Added flow control to deal with congestion  Choice of a range of fiber and copper transmission media.  Defining “jumbo frames” for higher efficiency.