Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.

Slides:



Advertisements
Similar presentations
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Advertisements

14-MAC Sub-layer Dr. John P. Abraham Professor UTPA.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Data and Computer Communications
Computer Networks Ethernet I Professor Hui Zhang
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
Distributed Systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 3 – Introduction to Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control NWEN302 Computer Network Design.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Local Area Network Daniel Shin CS 147, Section 3 November 18, 2008.
 Lecturer : Ch. Nabeel Ahmed Superior University Grw Campus 1.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Medium Access Control Sub Layer
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
The Medium Access Control Sublayer
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
CT301 LECTURE 8.
Nada Al Dosary CT 1502 Planning and Design of Communication Networks Local Area Networks (LANs) & Networks.
High Speed LANs – Ethernet and Token Ring
The Medium Access Control Sublayer
The Medium Access Control Sublayer
THE IEEE MAC SUB-LAYER – chapter 14
The Medium Access Control Sublayer
7- chapter Seven Local Area Networks (LAN)
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Presentation transcript:

Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent on technology and topology There are two major classes of networks  Wide Area Networks (WAN)  Local Area Networks (LAN) Each class may use a variety of topologies

Layer 2 Technologies Point-to-Point  A station is directly connected to another  Often used in WANs  Each station may connect to all other stations (fully meshed)  Or, one station may connect to only a subset of stations in a network  For large networks, fully meshed networks are rare due to cabling complexity and costs  May be wired or wireless

Layer 2 Technologies Shared Channels  Stations share a communications channel  Most often used in LANs  May require some form of addressing  May allow transmitting to ‘many’ or ‘all’ stations Full broadcast Multicast – group of stations  How does a station get its ‘fair’ share?  How does a station gain ‘permission’ to transmit? Must implement Media Access Control  May also be wired or wireless

Layer 2 Topologies Topology is a connection strategy May be influenced by the medium Dictates in part the path a frame will take Many general topologies have been implemented. Both for LANs and WANs

LAN/WAN Topologies StarRing

LAN/WAN Topology BusTree

LAN/WAN Topologies Full MeshPartial Mesh

Locality of Reference Computers are most often organized in groups and locally interconnected as LANs Computers often communicate with computers that are close by or ‘local’. Examples are computers communicating with departmental servers As a result, most traffic is ‘local’ and never leaves the LAN Thus, networks are organized in groups, or LANs. LANs of any topology can then be interconnected to form larger networks

Interconnected LANs Bridge

Interconnected LANs Bridge

LAN Standards Managed by an IEEE committee – called the 802 committee Many subgroups within the 802 committee Logical Link (inactive) 802.3Ethernet and variants 802.4Token Bus 802.5Token Ring 802.6Metropolitan Area Networks (inactive) …… Wireless LANs (WiFi) (a,b,g,e,I,n) ……… Broadband wireless (WiMAX)

Network Architectures We will discuss two major layer two network architectures. LAN Ethernet and IEEE Wireless LANS and IEEE WAN Point to Point Protocols (HDLC)

Broadcast Networks Consider N users on a shared channel User transmits when a frame is ready to send Other users also transmit at will If frames from 2 users ‘overlap’ we have a collision Collisions yield damaged frames Users can ‘hear’ own transmission and therefore can detect collisions

Broadcast Networks Summary  Transmit at will  Listen for own frame  Retransmit if collision Collisions are wasted bandwidth On average, if we have a shared broadcast channel what throughput can we expect?

Aloha Network Early broadcast network developed at University of Hawaii – 1970 Designed to interconnect 7 campuses of the U of H on 4 islands Used radio broadcasts Central Computing Center served as hub Campuses communicated through this center over shared radio frequencies

Aloha Network Computing Center Campus ACampus B 413 MHz 407 MHz Channels 9600 bps Frame 704 bits What is maximum channel utilization ?

t = time to transmit frame vulnerable t0t0 t 0 + tt 0 + 2t t t 0 + 3t

Aloha Throughput Let time to transmit a packet to be 1 unit Let S = Average number of packets per packet time 0 < S < 1 Let G = retransmissions + new packets (S) G ≥ S It is assumed that G and S follow Poisson Distribution

Aloha Throughput Based on this we can show G S.5 at G =.5 S =.5(e -1 ) = 1/(2e) S = approx.18

Aloha This is called Pure Aloha – stations transmitted at will This was later modified that required stations to only transmit at predefined times – driven by a central clock Now we need no collision for 1 packet time rather than 2 In this case the utilization improved to or S = 1/e =.36 This is called Slotted Aloha

Aloha

Carrier Sense Multiple Access We can improve on Aloha if we listen before transmitting A family of protocols called Carrier Sense Multiple Access (CSMA) has evolved All involved some form of listen before speak Variations of when to speak if no transmissions (carrier) heard

CSMA Non Persistent  Listen on channel  If free, transmit  If busy, wait random time – repeat  If collision, wait random time – repeat Persistent (also called 1-persistent)  Listen on channel  If free, transmit  If busy, continue to listen until free – transmit  If collision, wait random time - repeat

CSMA p – Persistent  Compromise  Listen on channel  If free, transmit with probability p and delay 1 unit time with probability 1-p  If channel busy wait until free, repeat

CSMA