Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 The Medium Access Sublayer Shivkumar Kalyanaraman Rensselaer Polytechnic Institute

Slides:



Advertisements
Similar presentations
LAN Technologies LAN TECHNOLOGIES.
Advertisements

Topic 7 Local Area Networks (LAN)
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6961 Internet Protocols Shivkumar Kalyanaraman Rensselaer Polytechnic Institute
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 Internet Protocols ECSE:6961 Shivkumar Kalyanaraman Rensselaer Polytechnic Institute
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EECC694 - Shaaban #1 lec #6 Spring Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: –Computers connected by communication.
Review of Networking Concepts
Midterm Review 1 Introduction –Basic terminology and concepts. Physical Layer –Time and frequency domains. –Bandwidth and data rate. –Analog and digital.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Chapter 2 Review of Computer Network Technology
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
4/11/40 page 1 Department of Computer Engineering, Kasetsart University Introduction to Computer Communications and Networks CONSYL Ethernet.
1 Chapter Overview Ethernet FDDI Wireless Networking.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
10-01-K.Steenhaut & J.Tiberghien - VUB 1 Telecommunications Concepts Chapter 3.1 Packet Switched Local Area Networks.
Network Architecture Layout designed and constructed by: Vicki Kertz.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.
Medium Access Control NWEN302 Computer Network Design.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
CSCI 465 D ata Communications and Networks Lecture 21 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Local Area Networks: Ethernet. IEEE Background Institution of Electrical and Electronic Engineering (IEEE) A professional non-profit organization Project.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
CS3505: Loca Area Networks CSMA/CD : IEEE and LAN Internetworks.
LANs : Aloha/CSMA , summary
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Link Layer MAC Dr. Mozafar Bag-Mohammadi University of Ilam.
1 Chapter Overview Ethernet Token Ring FDDI Wireless Networking.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Computer networks. Topologies Point to point Bus (rail) Ring Tree, star, etc.
The Medium Access Control Sublayer
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Data Link Layer Lower Layers Local Area Network Standards
Multiple Access Mahesh Jangid Assistant Professor JVW University.
The Medium Access Control Sublayer
CPEG512 Advanced Computer Networks
The Medium Access Control Sublayer
Chapter 12 Local Area Networks
7- chapter Seven Local Area Networks (LAN)
Chapter 12 Local Area Networks
Chapter 12 Local Area Networks
Computer Interfacing and Protocols
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Multiple Access Control (MAC) Protocols
LAN Technologies LAN TECHNOLOGIES.
Presentation transcript:

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-1 The Medium Access Sublayer Shivkumar Kalyanaraman Rensselaer Polytechnic Institute Based in part upon the slides of Prof. Raj Jain (OSU), K. Vastola (RPI)

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-2 q Multiple Access: Aloha, Slotted Aloha, CSMA/CD q IEEE 802 LANs: Ethernet, Token Ring, LLC q Bridges: Transparent, Source Routing, Remote q High Speed LANs: Fast Ethernet Overview

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-3 The MAC Layer Problem q Single communications channel shared by many spatially distributed users who can communicate only through this channel. q A MAC protocol is a set of rules employed independently by each multi-access user to gain access to the channel (a distributed algorithm) q Classification: q Fixed Assignment Protocols: TDMA, FDMA, CDMA q Random Access Protocols: Aloha, CSMA, CSMA/CD q Demand Assignment Protocols: Polling, Token Passing

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-4 Fixed Assignment Multiaccess Protocols q Oldest and conceptually simplest approach q Basic idea: assign each user a fixed portion of channel resources (“spatial multiplexing”) q Ways to do it: q Time: Time Division Multiple Access (TDMA) q Divide time into equal-length slots and allocate one slot per-user in turn (round-robin fashion). q A TDMA “frame”: set of N slots (one per user) q Note: TDMA is “distributed” TDM

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-5 Fixed Assignment Multiaccess Protocols q Frequency/bandwidth: FDMA q User gets frequency band and can transmit continuously in that band. q Matches need of continuous streams (eg analog video) q Bandwidth wasted due to guard bands q All-optical networks uses variant: “WDMA” q Combination of time/frequency: CDMA q Code Division Multiple Access q Divvy up both time and frequency into a 2-d grid of slots q Frequency Hopping CDMA: each user is assigned a different frequency in each time slot

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-6 Fixed Assignment: Performance q Fixed assignment protocols ideal for continuous streams, but bad for data because it exploits only spatial multiplexing. q With ideal statistical multiplexing (“using channel when packets are waiting”), M/M/1 queueing analysis says that the mean delay: q E(T) = 1/(  - ), where is the mean arrival rate and  is the mean service rate q With fixed assignment, each channel has service rate  /N and assuming arrival rates of /N, and separate M/M/1 queues, we find: q E(T) = 1/(  /N - /N) = N/(  - ) q So, use of fixed assignment protocols for packet switched data implies an increase in mean delay by a factor of N !!

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-7 Random Access Protocols q Fundamentally different approach. q Aloha at Univ of Hawaii: Transmit whenever you like. Random retransmission time. Worst case utilization = 1/(2e) =18% q Slotted Aloha: Fixed size transmission slots Worst case utilization = 1/e = 37% q CSMA: Carrier Sense Multiple Access Listen before you transmit q CSMA/CD: CSMA with Collision Detection Listen while transmitting. Stop if you hear someone else

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-8 Aloha Performance q Let frame time = 1 q S = New Traffic in Number of frames/unit time  S = 1  Fully loaded system q G = New frames + Retransmissions = Total load q S = GP[0] q P[k frames/unit time] = G k e -G /k!, k=1,2,3,... q P[0] = e -2G, assuming a window of vulnerability of normalized length 2 units = P[no attempts in 2 time units] q P[0] = success rate/attempt rate = S/G. q Equating the above two results, we get: S = Ge -2G q => Max S = 1/2e, at G=0.5  For Slotted Aloha: S = Ge -G  Max S = 1/e at G=1

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-9 Aloha Performance (cont)

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-10 CSMA q “Sense the carrier” (radio lingo) before transmitting q 1-persistent CSMA: If the channel is idle, transmit If the channel is busy, wait until idle and transmit q 0-persistent CSMA: If the channel is busy, go away for a random period of time q p-persistent CSMA: Applies to slotted channels. q If the channel is busy, wait until next slot. q If the channel is idle, transmit with a probability p or wait until next slot with probability 1-p q Slot length = propagation delay

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-11 CSMA Performance

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-12 CSMA/CD q Collision detection can take as long as 2× One-way propagation delay  Packet time > 2  = 51.2  s = 64 bytes at 10 Mbps

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-13 CSMA/CD Performance  Efficiency= Max throughput/Line rate = P/(P+2  /A) Where, P = Frame time  = one-way propagation delay A = P[only one station transmits during a slot ] = fn{# of stations trying to transmit} = 1/e for infinite stations  Efficiency = 1/(1+2  /A) Where  = Propagation delay/Frame time = (Distance/Speed of signal)/(Frame size/Data rate) = (Distance ×Data Rate)/(Frame Size × Signal Speed)  Efficiency is a decreasing function of 

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-14 CSMA/CD Performance Fig 4-23

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-15 IEEE CSMA/CD q If the medium is idle, transmit (1-persistent). q If the medium is busy, wait until idle and then transmit immediately. q If a collision is detected while transmitting,  Transmit a jam signal for one slot (= 51.2  s = 64 byte times) q Wait for a random time and reattempt (up to 16 times)  Random time = Uniform[0,2 min(k,10) -1] slots  truncated binary exponential backoff

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute Base5 Cabling Rules q Thick coax q Length of the cable is limited to 2.5 km, no more than 4 repeaters between stations  No more than 500 m per segment  10Base5 q No more than 2.5 m between stations q Transceiver cable limited to 50 m 2.5m 500 m Repeater Terminator Tranceiver

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute PHY Standards q 10BASE5: 10 Mb/s over coaxial cable (ThickWire) q 10BROAD36: 10 Mb/s over broadband cable, 3600 m max segments q 10BASE2: 10 Mb/s over thin RG58 coaxial cable (ThinWire), 185 m max segments q 1BASE5: 1 Mb/s over 2 pairs of UTP q 10BASE-T: 10 Mb/s over 2 pairs of UTP q 10BASE-F: Fiber Optic inter-repeater link (FOIRL), 10BASE-FL (link), 10BASE-FB (backbone), or 10BASE-FP (Passive)

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute BASE5 vs 10BASE-T R R R R R R

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-19 Manchester Encoding q Manchester: 1= down, 0 = up q Differential Manchester: 0 = Transition, 1=No transition

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-20 Ethernet Address Format q Multicast = “To all bridges on this LAN” q Broadcast = “To all stations” = = FF:FF:FF:FF:FF:FF Multicast/ Unicast Global/ Local Organizationally Unique ID

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-21 Frame Format q Ethernet q IEEE Dest. Address Source Address Type 662 Size in bytes Dest. Address Source Address Length Info 662 IPIPXAppleTalk LLC IPIPXAppleTalk CRC 4 4 Pad Length Info

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-22 Fast Ethernet Standards q 100BASE-T4: 100 Mb/s over 4 pairs of CAT-3, 4, 5 q 100BASE-TX: 100 Mb/s over 2 pairs of CAT-5, STP q 100BASE-FX: 100 Mbps CSMA/CD over 2 fibers q 100BASE-X: 100BASE-TX or 100BASE-FX q 100BASE-T: 100BASE-T4, 100BASE-TX, or 100BASE-FX 100BASE-T 100BASE-T4 100BASE-X 100BASE-TX 100BASE-FX 100BASE-T2 Based on FDDI Phy

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-23 X 100 BASE-X q X = Cross between IEEE and ANSI X3T9.5 IEEE Logical Link Control IEEE CSMA/CD IEEE PHY Coding IEEE Medium Attachment Unit ANSI X3T9.5 MAC ANSI X3T9.5 PHY ANSI X3T9.5 PMD 100BASE-X

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-24 Interconnection Devices q Repeater: PHY device that restores data and collision signals q Hub: Multiport repeater + fault detection and recovery q Bridge: Datalink layer device connecting two or more collision domains. MAC multicasts are propagated throughout “extended LAN.” q Router: Network layer device. IP, IPX, AppleTalk. Does not propagate MAC multicasts. q Switch: Multiport bridge with parallel paths These are functions. Packaging varies.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-25 Interconnection Devices HH B HH Router Extended LAN =Broadcast domain LAN= Collision Domain Network Datalink Physical Transport Router Bridge/Switch Repeater/Hub Gateway Application Network Datalink Physical Transport Application

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-26 Transparent Bridges q Bridges learn the location of stations by monitoring source addresses  Stations do not realize that there is a bridge between them  Transparent

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-27 Transparent Bridges (cont)  They avoid loops by forming a spanning tree  Spanning tree bridges

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-28 Ethernet vs Fast Ethernet R R R R

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-29 Full-Duplex Ethernet q Uses point-to-point links between TWO nodes q Full-duplex bi-directional transmission q Transmit any time q Not yet standardized in IEEE 802 q Many vendors are shipping switch/bridge/NICs with full duplex  No collisions  50+ Km on fiber. q Between servers and switches or between switches

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-30 Gigabit Ethernet q Uses switched-architecture, not shared => no GbE “hubs” q Micro-segmentation => 1 host per-switched segment q Uses full-duplex Ethernet => no contention => no CSMA/CD ! q Uses multimode and single-mode fiber (though Broadcom recently has developed chips for UTP transmission) q Only support for the frame format, preservation of min/max frame sizes q Since  larger, some minimal flow control is proposed

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-31 Logical Link Control q LLC used for all IEEE 802 protocols q LLC type 1, type 2, type 3, type 4,...

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-32 LLC Type 1 q Unacknowledged connectionless (on 802.3) No flow or error control. Provides protocol multiplexing. Uses 3 types of protocol data units (PDUs): UI = Unnumbered informaton XID = Exchange ID = Types of operation supported, window Test = Loop back test

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-33 LLC Type 2, 3 q Type 2: Acknowledged connection oriented (on 802.5) Provides flow control, error control. Uses SABME (Set asynchronous balanced mode), UA (unnumbered ack), DM (disconneced mode), DISC (disconnect) q Type 3: Acknowledged connectionless Uses one-bit sequence number AC command PDUs acked by AC response PDUs

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-34 LLC Multiplexing q Multiplexing allows multiple users (network layer protocols) to share a datalink q Each user is identified by a “service access point (SAP)” ControlDSAPSSAPInfo  Eight-bit SAP  Only 256 standard values possible q Even IP couldn’t get a standard SAP. Use Subnetwork Access Protocol SAP (SNAP SAP) 888Size in bits

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-35 Token Ring Fig 9.18 Delayed token release vs Immediate token release 4 Mb/s 16 Mb/s

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-36 Priorities  Received Priority = Pr  This token/frame’s priority  Received reservation = Rr  Someone on the ring wants to transmit at Rr q To transmit a message of priority Pm, you should get a free token with Pr < Pm q If free but Pr>Pm and Rr<Pm, reserve token by setting Rr=Pm  If busy and Rr<Pm then reserve by setting Rr  Pm q If busy and Rr>Pm, wait q When you transmit, set Rr=0, and busy=1. After transmission, issue a new token with Pr=Max{Pr,Pm,Rr}, Rr=Max{Rr,Pm} Received Priority Received Reservation Busy 3311 Size in bits

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-37 FDDI q Fiber Distributed Data Interface q ANSI Standard for 100 Mbps over Fiber and twisted pair q Timed token access q Up to 500 stations on a single FDDI network q Inter-node links of up to 2km on multimode fiber, 60+ km on single mode fiber, Longer SONET links, 100 m on UTP.  Round-trip signal path limited to 200 km  100 km cable.

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-38 Dual-Ring of Trees Topology High-End Server Personal Work- station High-End Workstation Server Main Frame Concentrator Computer

Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1-39 Summary q Ethernet/IEEE 802.3: CSMA/CD, Baseband, broadband q Fast Ethernet q Token ring/IEEE q LLC q Transparent and source routing bridges