LANs Media Access Control Step 1 in Sharing Resources.

Slides:



Advertisements
Similar presentations
Topic 7 Local Area Networks (LAN)
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Ethernet – CSMA/CD Review
The Data Link Layer introduction point-to-point data link protocols
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Local Area Networks LAN. Why LANs? Provide a means of DIRECT connection to other machines Manage access Provide reasonable performance Hopefully allow.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 5 – Collision management.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
CS335 Networking & Network Administration Wednesday, April 7 PacketsPackets, Frames, and Error DetectionFramesError Detection.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Cs/ee 143 Communication Networks Chapter 3 Ethernet Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech.
Connecting LANs, Backbone Networks, and Virtual LANs
Network Topologies An introduction to Network Topologies and the Link Layer.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
CSC 336 Data Communications and Networking Lecture 7d: Interconnecting LAN Dr. Cheer-Sun Yang Spring 2001.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
Introduction network Protocol
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Chapter Six The Data Link Layer. Objectives Learn about physical addressing on the network. Explore the MAC and LLC sublayers of Data Link. Get introduced.
Multiple Access.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Link Layer 5.1 Introduction and services
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
CT301 LECTURE 8.
Networking Devices.
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
TOKEN BUS & TOKEN RING.
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Presentation transcript:

LANs Media Access Control Step 1 in Sharing Resources

Lots of Strategies Ethernet Token Ring Token Bus ATM DSL FDDI Sonet …….

General Interest Qualitative understanding of the function Comparison/Contrast of a few strategies Design tradeoffs Ethernet as a common example –Numerous faces of the same technology –Performance considerations analytical practical –Lots of access/info available –Widely used

Physical Layer.. Not network! Does not perform routing Requires additional hardware and software to interconnect networks Not functionally different from other direct connections like a serial cable –EXCEPT - must share the LAN Application Presentation Session Transport Network Data Link Physical

Physical Characteristics Limited distance –typically a building or room in a building Data rates used to be in the 10sMbps but now can be much faster (typically 100sMpbs now) Different LANs support different types of traffic better Performance limits the number of machines – Low error rates!

CSMA-CD Derived from Aloha net Similar performance issues No central control Avoids overhead of allocation Doesn’t perform as well in highly loaded scenarios In practice typical demands do not saturate the network

CSMA-CD basic algorithm Look to see if someone is ON If so refrain and if not try If you see your own transmission uncorrupted as you read the line, assume no one else sent If not, collision from someone else acting as you have Wait a while and try again See Figure 3.4

Figure 3.1 A starts to send Data hasn’t yet arrived at B B sends B sees collision right away A sees collision much later a -> (frames on link) is small see collision quickly recover and repeat quickly 10 collisions at 5microsecs ea one 10-millisecond frame calculate the efficiency do a real value of a for a LAN

What about collisions? If you collide, assume at least one other trying “Flip a coin” and try again to reduce collision chances If again, could just have bad luck OR more than one other trying Flip a 4-sided coin and then try again After 16 collisions, drop the packet –Truncated Binary Exponential Backoff

Physical Considerations 10 Base 2200mthin coaxbus 10 Base 5500mthick coaxbus 10 Base T(X)100mtwisted pairsstar 10 Base F1000mFiberpt-pt hubs and busses work on the same principles but have a different physical appearance physical vs logical 10 mpbs, 100 mpbs, 1000 mbps

Frame Format Figure 3.3 –details more apparent with protocol info Part b –slot time time to be sure all is ok –max frame size –min frame size

Token Ring

Token premise One token (symbol sequence) on ring First one to grab it gets to hold it Must hold it in order to transmit When done, sender retransmits the token Date flows in a circle One bit delay at each node If you put it on, take it off Assume reasonable behavior

Grabbing the token …… trash 0 insert a 0 instead See Figure 6.12

Token Ring Issues Consider large and small “a” Recall LAN “a”s are small Head of message returns before tail sent. Sender removes and reinserts Automatic ACK (protocols) Management more complex –what if token is lost –how do you negotiate if one isn’t in charge (it is) –what if the one on charge dies –what if the cable is cut

Comparison ETHERNET TOKEN RING No bound on time for access YUK on periodic Degrades as traffic ^ Immediate access low loads Consider offered load no priority Each sends once so you can do a “worst-case” answer to how long to wait Can support periodic Limit to degradation Wait for token always Consider offered load priority possible (T Bus)

Desirables Low access delay Fast transmission Fairness Prioritization Robustness Large number of nodes Any distance Cheap

Performance Analysis (see notes) Maximum case