Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet Standards Ethernet concepts origin DIX consortium – Mbps Ethernet 1 st Blue book – 1980 IEEE group takes over – Project 802 –802.1 – High.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 4 – Ethernet frame.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
Spring 2006CS 3321 Chapter 2 Tidbits Outline A little hardware Ethernet Realistic data transfer rates.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
Chapter 13 Wired LANs: Ethernet
Lecture 17 Ethernet r Widely deployed because: m First LAN technology m Simpler and less expensive than token LANs and ATM m Kept up with the speed race:
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
Lecture 9: Ethernet and Token Ring Networks
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Internetworking An internetwork is typically comprised of many physical networks over which data travels There are many different types of physical networks:
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Logical & Physical Topologies A logical technology is how the hosts are connected logically example token Ring can be laid out in a physical star but.
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
Ethernet Standards DIX consortium – Mbps Ethernet 1 st Blue book – 1980 IEEE group takes over – Project 802 –802.1 – High Level Interface –HLI –
Cisco 3 – Switching Concepts Perrine. J Page 16/1/2016 Module 4 The use of bridges and switches for segmentation results in ____? 1.Multiple broadcast.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
1Ethernet Lecture # 12 Computer Communication & Networks.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Chapter 2: Direct Link Networks (Part Two) Dr. Rocky K. C. Chang 30 January 2004.
1 Ethernet History –developed by Xerox PARC in mid-1970s –roots in Aloha packet-radio network –standardized by Xerox, DEC, and Intel in 1978 –similar to.
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Lec # 23 Data communucation Muhammad Waseem Iqbal 1ethernet.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
The University of Adelaide, School of Computer Science
Advanced Computer Networks
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Ethernet Neil Tang 9/17/2008 CS440 Computer Networks.
Protocol layering and data
Protocol layering and data
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
Computer Interfacing and Protocols
Ethernet 16EC351 Computer networks unit II Mr.M.Jagadesh,AP/ECE.
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing
Presentation transcript:

Lecture 8: Ethernet and Token Ring Networks

Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel, Xerox 1978  IEEE Mbps—We are going to talk about this 100,1000 Mbps—These are used for point- to-point links in switched networks

50  cable Taps at least 2.5 meters apart Up to 500 m between hosts- < 4 repeaters between hosts- End-to-end length < 2500 m Propagation delay <8.7  s Not more than 1024 hosts

Network topology with at most 2 repeaters between hosts Repeaters have queuing delay is 4.2  s for 10 Mbps ethernet Max queuing delay=16.9  s/between any two hosts Max delay= 25.6  s between any two hosts

Network topology with two stars connected by a point-to-point link

Newer Technologies 10BaseT –Cat 5 copper 100 Mbps ethernet –Switched, point-to-point Gigabit ethernet –Switched, point-to-point technology

Access Protocol Frame Format Addresses Receiver Algorithm Transmitter Algorithm

Ethernet Frame MAX=1500 bytes Min=46 bytes Type—demux key to identify application CRC-32

Addresses Media Access Control (MAC) address –48 bits/6 bytes-X 1 X 2 :X 3 X 4 :X 5 X 6 :X 7 X 8 :X 9 X 10 :X 11 X 12 –Unique worldwide for all time –Belongs to adapter Broadcast address –FF:FF:FF:FF:FF:FF Multicast address –1xxxxxxx:XX:XX:XX:XX:XX

Receiver Algorithm Adaptor –Receives all frames on the ethernet –Accepts Frames Addressed to: Its unicast address the broadcast address A mult-cast address it has been programmed to accept –Accepts all frames in “promiscuous (eavesdropping) mode”

Transmitter Algorithm If adapter has a frame to send: Line is idle-sends its frame-up to 1500 bytes Line is busy-wait til line goes idle and send the frame Collisions These are detected as overvoltage AT AN ADAPTER Sends 32 bit jamming sequence and shuts down-purpose of jamming frame is to cause a collision at the sender So, the frame will be truncated-could be as small as 96 bits (64 bit preamble+32 bit jamming sequence) Called a “runt” frame

Worst-case collision scenario: a)A transmits at time t=0 b)B sends frame just before t=d(delay) c)B detects collision and sends runt frame d)A detects collision at time 2d (if its still sending!) e)Frame must be 2d=51.2 seconds long for collision to occur at A f)Frame must be at least 512 bits long at 10 Mbps

Exponential backoff collision recovery Wait k*52.1  s where k=0,1,…,2 n -1 –n=number of unsuccessful attempts to transmit –delay selected at random in each attempt

The ethernet advantage It’s simple—no routing tables to maintain It’s flexible—just plug in your PC It’s cheap –Cable—$ 0.12/ft –Adaptors—$ 20 –Hubs--$ 30/port –Switch--$ 50/port

Token Ring Shared medium similar to ethernet –Distributed algorithm controls transmission –All nodes see all frames Token=small circulating frame To send: Remove token and send frame Sender: removes message when it comes around and inserts token

Token ring specification IBM Token Ring IEEE Fiber Distributed Data Interface (FDDI)

Relays (normally closed) in the network adapter protect the ring from host failures

Multi-station access unit (MSAU) create a star-like topology