Link-layer EE122 Discussion 10/14/2011. MAC Addresses Link-layer deals with MAC addresses – 48-bit addresses, flat name space – E.g., 88-9F-FA-F9-74-75.

Slides:



Advertisements
Similar presentations
14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
Lecture 9: Multiple Access Protocols
Ethernet. Review Media Access Control – Broadcast media shared by all stations – MAC is used to determine who gets the right to send Developed protocol.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 5 – Collision management.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
EEC-484/584 Computer Networks Lecture 8 Wenbing Zhao
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
EEC-484/584 Computer Networks Lecture 8 Wenbing Zhao
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
16 – CSMA/CD - ARP Network Layer4-1. 5: DataLink Layer5-2 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Cs/ee 143 Communication Networks Chapter 3 Ethernet Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 26 Omar Meqdadi Department of Computer Science and Software Engineering.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
Chapter 4: Medium Access Control (MAC) Sublayer
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer multiple.
Network Layer4-1 Lower limit on the number of check bits r We want to design a code m with m message bits and r check bits Allowing all single errors to.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
1 Network Administration Module 3 ARP/RARP. 2 Address Resolution The problem Physical networks use physical addresses, not IP addresses Need the physical.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Module 5: Creating IPv4 Address Spaces. Overview of IP Communication Subnetting Overview Subnetting for Complex Networks.
Multiple Access.
5: DataLink Layer5-1 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire frame r If channel sensed.
Multiple Access Links and Protocols
Ethernet. Ethernet (802.3) 1-persistent CSMA, CD, binary exponential backoff Carrier sense: station listens to channel first. 1-persistent: If idle, station.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 5. The Link Layer and Local Area Networks Myungchul Kim
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
Lab 7 – CSMA/CD (Data Link Layer Layer)
Overview Jaringan Komputer (3)
Ethernet Neil Tang 9/17/2008 CS440 Computer Networks.
The Medium Access Control Sublayer
Data Communication Networks
Figure 3.1 Internet model.
Link Layer: Multiple Access
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Presentation transcript:

Link-layer EE122 Discussion 10/14/2011

MAC Addresses Link-layer deals with MAC addresses – 48-bit addresses, flat name space – E.g., 88-9F-FA-F – Use ipconfig (Windows) or ifconfig (Linux)

Address Resolution Protocol “I want to reach IP address a.b.c.d. What is the MAC address of the corresponding machine?” – Broadcast Response from appropriate machine – Cache mappings …default, use the gateway router

Question 1 1.Use subnet mask; not in same network 2.ARP: - “Who has ?” 3.ARP Response: - “I do” 4.A  5.ARP: - “Who is ?” 6.ARP Response: - “I do” 7.R 

Multiple Access “How can multiple hosts share a medium?” Channel Partitioning – Access to channel in fixed slots (TDMA/FDMA) – Easy to implement and reason about

Random Access Carrier Sense Multiple Access (CSMA/CD) 1.Listen and transmit only if free 2.If collisions detected, abort transmission – Why would there be collisions?? 3.Resend after a probabilistic wait

Limitations of length Collision is detected after twice the propagation delay – Keep transmitting in that interval Frame needs to be big enough!

Efficiency of CSMA/CD Time wasted in collisions – Proportional to distance d Time spend transmitting a packet – Packet length p divided by bandwidth b Rough estimate for efficiency (k some constant) = (p/b) / ((p/b) + kd)

Binary Exponential Back-off Hold on for a while after you detect collision – Introduce some randomness After each collision, choose K randomly from {0, …, 2 m-1 } – m is the #collisions since last successful transmission – Wait for K * 512 bit times before trying again

Question 3 a)p is low  lower probability of collisions  CSMA/CD is good a)p is high  high probability of collisions  channel partitioning is better

Question 4 Host must send data at least for twice propagation delay Propagation Delay = (d/2*10 8 ) Min size of frame ≥ 2 * (d/2*10 8 ) * 1Gbps …d ≤ 100m

Question 5

Question 6 Efficiency of CSMA/CD is (p/b) / ((p/b) + kd) As link speed increases, the efficiency goes down – (c)