Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control.

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
Chapter 9 Local Area Network Technology
Chapter 7 Data Link Layer
LAN Protocol Architecture
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Chapter 7- Data Link Layer
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
OSI Model.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
Review on Networking Technologies Linda Wu (CMPT )
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COMPUTER NETWORKS.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
IEEE Wireless LAN Standard Chapter 14. IEEE 802 Protocol Layers.
Introducing Network Standards Open Systems Interconnection (OSI) Model IEEE 802.x Standard Device Drivers and OSI 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Data Link Layer Network Fundamentals – Chapter 7.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
CSCI 465 D ata Communications and Networks Lecture 19 Martin van Bommel CSCI 465 Data Communications & Networks 1.
IEEE Wireless LAN Standard
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Data Link Layer Dr. Muazzam A. Khan.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Topic 8 – LAN Fundamentals 1 FIT1005 FIT – Monash University Topic 8 Local Area Network (LAN) Fundamentals Reference: Stallings Ch 15 7E, Ch 13 6E.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ethernet Overview it the IEEE standard for Ethernet.
Data Link Layer and Ethernet COM211 Communications and Networks CDA College Theodoros Christophides
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
Chapter 7 OSI Data Link Layer.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
2016/3/11 1 Data Link Layer. 2016/3/11 2 Two basic services of Data Link Allows the upper layers to access the media using techniques such as framing.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
IEEE Wireless LAN Standard
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
Chapter 12 Multiple Access.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Chapter 12 Local Area Networks
THE IEEE MAC SUB-LAYER – chapter 14
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
The Medium Access Control Sublayer
Chapter 12 Local Area Networks
Chapter 12 Local Area Networks
Lecture Protocol & Model Ashis Talukder, MIS, EWU.
Dr. John P. Abraham Professor UTPA
Ethernet and Token Ring LAN Networks
Presentation transcript:

Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control

Dr. L. Christofi 2 Overview The architecture of a LAN is best described in terms of a layering of protocols that organize the basic functions of a LAN This section opens with a description of the standardized protocol architecture for LANs, which includes —Physical layer —Medium Access Control (MAC) layer —Logical Link Control (LLC) layer Physical layer includes topology and transmission medium (covered in lecture 1) This section provides an overview of MAC and LLC layers

Dr. L. Christofi 3 Medium Access Sublayer (1) Network Layer Data Link Layer Physical Layer Medium Access Sublayer Logical Link Control Sublayer

Dr. L. Christofi 4 Medium Access Sublayer (2) Medium access (MAC) sublayer is not important on point-to-point links The MAC sublayer is only used in broadcast or shared channel networks MAC protocols enable two stations (or nodes) using a shared communication resource to establish, maintain and terminate a connection. Examples: Satellite, Ethernet, Cellular

Dr. L. Christofi 5 IEEE 802 Standard (1) Data Link Layer Physical Layer LLC Sublayer Physical Layer MAC Sublayer IEEE Ethernet IEEE (CSMA/CD) IEEE Token bus IEEE Token Ring FDDI OSI Layers LAN Specification

Dr. L. Christofi 6 IEEE 802 standard (2) IEEE 802 standard defines: —Physical layer protocol —Data link layer protocol Medium Access (MAC) Sublayer Logical Link Control (LLC) Sublayer

Dr. L. Christofi 7 IEEE 802 standard 802.2: Logical Link Control (LLC) —explained in this section 802.3: CSMA/CD (Ethernet) — explained in this section 802.5: Token Ring — explained in lecture : Wireless LANs — explained in lecture 3

Dr. L. Christofi 8 IEEE 802 vs OSI model

Dr. L. Christofi Layers functions Physical —Encoding/decoding —Preamble generation/removal —Bit transmission/reception —Transmission medium and topology Logical Link Control —Interface to higher levels —Flow and error control Medium Access Control —Data assembly and dismantle into frames —Govern access to LAN transmission medium

Dr. L. Christofi 10 Scope of LAN protocols Consider two stations that communicate via a shared medium LAN. Higher layers (above LLC) provide end-to-end services between the stations Below the LLC layer, the MAC provides the necessary logic for gaining access to the network

Dr. L. Christofi 11 Logical Link Control (LLC) The LLC layer for LANs is concerned with the transmission of a link-level protocol data unit (PDU) between two stations, without the necessity of an intermediate switching node It has two characteristics: —It must support the multi-access, shared medium nature of the link —It is relieved from some details of link access by the MAC layer

Dr. L. Christofi 12 LLC Services Unacknowledged connectionless service —Datagram-style —Does not involve any flow and error control mechanisms —Data delivery is not guaranteed Connection mode service —A logical connection is set up between two stations —Flow and error control are provided Acknowledged connectionless service —A cross between the previous services —Datagrams are to be acknowledged —No prior logical connection is set up

Dr. L. Christofi 13 Medium Access Control (1) Assembly of data into frame with address and error detection fields Disassembly of frame and performing of —Address recognition —Error detection Govern access to transmission medium —Not found in traditional layer 2 data link control For the same LLC, several MAC options may be available

Dr. L. Christofi 14 Medium Access Control (2) All LANs and MANs consist of a collection of devices that must share the network’s transmission capacity Some means of controlling access to the transmission medium is needed for efficient use of that capacity. This is the function of a Medium Access Control (MAC) Protocol. The key parameters in any MAC technique are where and how. —Where, refers to whether control info is exercised in a centralized or distributed fashion. Centralized: a controller has the authority to grant access to the network Distributed: the stations collectively perform a MAC function to determine dynamically the order in which stations transmit —How, is contrained by the topology and is a trade-off among competing factors, such as cost, performance and complexity

Dr. L. Christofi 15 LAN Protocols in Context

Dr. L. Christofi 16 Generic MAC frame format MAC control: contains control info for the functioning of the MAC protocol, eg priority level Destination MAC address: the destination physical attachment point on the LAN for this frame Source MAC address: the source physical attachment point on the LAN for this frame LLC: The LLC data from the next higher layer CRC: Cyclic Redundancy Check field, used to check if a transmission error has occurred

Dr. L. Christofi 17 MAC techniques Synchronous —A specific capacity is dedicated to a connection —Same approach as in circuit-switching FDM or TDM, so not optimal for LANs/MANs because the needs of the stations are unpredictable Asynchronous —Capacity is allocated in a dynamic fashion, in response to demand —Subdivided into three categories Round Robin Reservation Contention

Dr. L. Christofi 18 Asynchronous MAC techniques Round Robin —Each station in turn is granted the right to transmit —After each station finishes transmitting, it passes the right to transmit to the next station in logical sequence —Efficient technique when many stations have data to transmit over an extended period of time Reservation —For stream traffic (voice, bulk file transfer etc) —Time on the medium is divided into slots, like synchronous TDM —A station whishing to transmit reserves slots for an extended period Contention —For bursty traffic (short, sporadic transmissions such as interactive terminal-host traffic) —No control is exercised to determine whose turn it is —Simple to implement and efficient for light loads

Dr. L. Christofi 19 Medium Access Control Methods The methods used for Medium Access Control are: —Carrier-sense multiple-access with collision detection (CSMA/CD) for bus topologies —Control token or Token Passing for bus and ring topologies

Dr. L. Christofi 20 CSMA/CD CSMA/CD is used only in bus type networks, where a number of nodes share a common communication channel (wire) known as the bus. CSMA/CD is used in traditional Ethernet —Ethernet will be covered in detail in future lectures

Dr. L. Christofi 21 CSMA/CD ABDC ABDC ABDC ABDC JAM Carrier sense multiple access collision detect (CSMA/CD) Carrier Sense Multiple Access Collision Detection (Backoff Algorithm) Collision

Dr. L. Christofi 22 CSMA/CD operation The basic operation of CSMA/CD is as follows: 1.To transmit data, the source station assembles a packet comprising of the destination address, the data and control info 2.The source station listens to the cable to determine if the bus is currently in use. If so, it waits until the bus is free, else it transmits the packet. This operation is known as carrier sensing. 3.During transmission, the source station continues to listen to the cable to detect if another station has also initiated a transmission thus causing a collision. This process is known as collision detection. 4.If a collision is detected then, to ensure all stations are aware of the collision, the source station transmits a random bit pattern known as the jam sequence. 5.Stations involved in a collision then back off for a random period before retrying for packet transmission.

Dr. L. Christofi 23 CSMA/CD procedure Sense the channel —If idle, transmit immediately —If busy, wait until the channel becomes idle Collision detection —Abort a transmission immediately if a collision is detected —Try again later after waiting a random amount of time

Dr. L. Christofi 24 Collision detection time How long does it take to realize there has been a collision? Worst case: 2 x end-to-end propagation delay Station A Station B packet t prop

Dr. L. Christofi 25 Control Token or Token Passing Another way of controlling access to a shared transmission medium is by a control token (Token Passing) The Control Token technique uses a control or permission token to share the communication resource between a number of nodes. The technique can be applied to both bus and ring network topologies. This token is passed from one station to another according to a defined set of rules A station may transmit a frame only when it has possession of the token and after it has transmitted the frame, it passes the token on, to allow another station to access the transmission medium

Dr. L. Christofi 26 Control Token operation (1) Whether using a ring or bus topology, a logical ring is established which links all the nodes using the physical medium (see next two slides) A single control (permission) token is created at one of the nodes The token is passed from node to node around the logical ring until it arrives at a node waiting to send a frame The node captures the token and transmits the frame Upon completing transmission, the node releases the token to the next node in the logical ring

Dr. L. Christofi 27 Control Token operation (2) A C B D token Assume DTE A wishes to send a frame to DTE C DTE A waits for receipt of control token from its upstream neighbor A C B D frame DTE A transmits frame on to the ring. DTE C copies the frame addressed to it. Frame continues around the ring.

Dr. L. Christofi 28 Control Token operation (3) A C B D frame DTE A awaits receipt of start of frame but does not repeat the frame, thereby removing it A C B D token When last bit of frame has been received DTE A generates and passes on the token: it then processes the response bits at the tail of the frame Either: Or: When last bit of frame has been transmitted by DTE A it passes on the token – early release A C B D token

Dr. L. Christofi 29 Sending frames or Control Token Sending frames 1.Source node monitors all frames in ring. 2.If it detects frames with its own source address it removes them from the ring 3.If it detects a corrupted frame, it removes it from the ring and retransmits a new one Sending Control Token 1.When source node finishes transmitting, it sends a token to its designated successor and it is acknowledged 2.If the successor does not respond, it then sends a “who- follows-then” message. If it receives a reply, it send a token 3.If it receives no reply, it sends “is anybody there?” message. If it receives a reply, it sends a token 4.If it does not receive any reply, it then stops transmitting but continues to listen.

Dr. L. Christofi 30 Token passing network l A token always circulates around a ring net. l A user grabs a token to transmit data

Dr. L. Christofi 31 Control Token procedure

Dr. L. Christofi 32 LAN addressing Communication involves three agents: —Processes —stations —networks The transfer of data from one process to another involves —getting the data to the station in which the destination process resides, and then —getting it to the intended process within the computer The above suggest the need for two levels of addressing —MAC address —LLC address

Dr. L. Christofi 33 User data and LAN/MAN protocol control info LLC user data (IP datagram) are passed down to LLC which appends a header, to make the LLC PDU The LLC PDU is passed to the MAC entity, which in turn appends a header and a trailer, to make the MAC frame

Dr. L. Christofi 34 Levels of addressing MAC address —Identifies a physical interface from the station to the LAN —There is one to one relationship between stations and physical addresses LLC address —Identifies an LLC user —The LLC address (LLC SAP) is associated with a particular user within a station —LLC SAP may refer to a process executing on a station or to a hardware port

Dr. L. Christofi 35 Review Questions Explain the difference between MAC and LLC protocols with respect to their functionality. Describe the techniques used in implementing MAC protocols. Which are the asynchronous MAC techniques and for which type if traffic are they best suited? Which methods are used for Medium Access Control and for which type of network topologies are they used? What is meant by CSMA/CD? Explain the operation of CSMA/CD. Explain the terms of collision detection and jam sequence. What is meant by Control Token? Explain by means of appropriate diagrams the operation of Control Token. In the context of Control Token MAC methods, which steps does the source station take when sending frames or the control token on a ring network topology?

Dr. L. Christofi 36 W. Stalling, Local and Metropolitan Area Networks, 6 th edition, Prentice Hall, 2000 References F. Halsall, Data Communications, Computer Networks and Open Systems, 4 th edition, Addison Wesley, 1995 B.A. Forouzan, Data Communications and Networking, 3rd edition, McGraw-Hill, 2004 W. Stallings, Data and Computer Communications, 7 th edition, Prentice Hall, 2004