Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing,

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Chapter 15: LAN Systems Business Data Communications, 4e.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
Chapter 13 Wired LANs: Ethernet
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
LAN SYSTEMS. GIGABIT ETHERNET Gigabit Ethernet protocol (1000 Mbps). The IEEE committee calls the Standard 802.3z. The goals of the Gigabit Ethernet design.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Ethernet, ARP.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Thin Ethernet (10B2 / IEEE 802.3a) Segment length 0.5 m Up to 30 attached nodes Cable flexible and cheap Integrated or external transceiver connected via.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
CSC 311 IEEE STANDARD ETHERNET Common Bus topology Uses CSMA/CD Named after “ether”, the imaginary substance many once believed occupied all of space.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
Ethernet Two nodes transmit at the same time
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Local Area Networks: Ethernet. IEEE Background Institution of Electrical and Electronic Engineering (IEEE) A professional non-profit organization Project.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
1 Traditional Ethernet 8Ethernet and CSMA/CD (IEEE 802.3) 8Carrier sense multiple access with collision detection 8Four step procedure 8If medium is idle,
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
IEEE STANDARDS IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
CCNA3 Module 4 Brierley Module 4. CCNA3 Module 4 Brierley Topics LAN congestion and its effect on network performance Advantages of LAN segmentation in.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Wired LANs: Ethernet Shashank Srivastava Motilal Nehru national Institute Of Information Technology, Allahabad 4 Sep 2013.
Introduction to Communication Lecture (10) 1. 2 Wired LANs: Ethernet IEEE Project 802 defines the LLC and MAC sublayers for all LANs including Ethernet.
ETHERNET Yash Vaidya. Introduction Ethernet is a family of computer networking technologies for local area networks (LANs). Ethernet was commercially.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Media Access Control (MAC) Sub-layer and Ethernet
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Protocol layering and data
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Presentation transcript:

Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF

MAC Sub-layer The MAC sub-layer is a sub-layer of the Data Link Layer and is used to determine how to allocate a single broadcast channel among competing users (e.g. in a LAN). The traditional way of allocating a single channel are FDM and TDM. These schemes are not efficient for computer generated traffic which is bursty. Many of the N users may be idle for long periods of time and channels will be underutilized. Also, if more than N users want to communicate, they will be denied access for lack of bandwidth. Hence we need a dynamic channel allocation scheme in LANs.

MAC Sub-layer LAN devices share the channel and the MAC protocols provide the means of controlling access to the channel. MAC categories: 1. Round Robin: Each station in turn is given the opportunity to transmit. The station may decline to transmit or may transmit subject to a specified upper bound (time). The station relinquishes its turn when done. E.g. Token Ring (IEEE 802.5) This scheme works well when many stations have data to transmit over an extended period of time (repeatedly), else the overhead of passing the turn will become excessive. 2. Contention: For bursty traffic, this is appropriate. No control is exercised to determine whose turn it is. All stations contend for time on the medium. They simple to implement but performance drops drastically under heavy load. E.g. Ethernet (IEEE 802.3)

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) CSMA/CD is the MAC protocol for bus LANs such as the Ethernet. A station wishing to transmit listens to the medium to determine if another transmission is in progress (carrier sense). If the line is idle is busy, station waits (keeps sensing it till the line becomes idle). Else it transmits. It is possible that two or more stations may attempt to transmit at the same time. If so, there will be a collision. If there is a collision, a station waits a random amount of time and then attempts to transmit again.

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Let the time for a signal to propagate between the two farthest stations be (in the above case A and C) be T pd. At ‘t 0 ’, A begins transmitting. At (T p – s), an instant before the signal arrives at the most distant station C, that station also begins transmitting. The station C detects the collision almost instantly and stops, but the little noise burst caused by the collision does not get back to the original station until time (2T pd – s). In other words, in the worst case a station cannot be sure that it has seized the channel until it has transmitted for 2T pd without hearing a collision. So frames must be long enough to allow collision detection prior to end of transmission (frame transmission time> 2 max * Prop. Delay)

IEEE (Ethernet): Bus Topology The Ethernet uses CSMA/CD MAC protocol. A transmission from any station propagates the length of the medium in both directions and can be received by all other stations. A station copies down frames addressed to it.

IEEE (Ethernet) Cabling 10Base5 cabling: This type of cabling is popularly referred to as thicknet. It was one of the earliest types of cables used for LAN’s. The notation 10Base5 suggests that the LAN operates at 10 Mbps, uses baseband signaling and can support segments of up to 500 meters. 10Base2 cabling: 10Base2 or thinnet, which in contrast to thicknet, bends easily. 10Base2 cables are easier to install and are relatively inexpensive. The only drawback of using the 10Base2 cable is that it can run for only 200 meters and can handle only 30 stations per cable segment. 10Base-T cabling: there is no single, main cable because each station has a cable running to a central hub (a big repeater). Adding or removing stations is simpler in this configuration and cable breaks can be detected easily. The disadvantage of 10Base-T is that the maximum cable run from the hub is only 100 meters, sometimes 150 meters (if high quality twisted pairs are used). 10Base-T is most popular due to the ease of maintenance.

IEEE (Ethernet) Hub

IEEE (Ethernet) IEEE has a certain maximum cable length/segment. To allow larger networks, multiple cables are connected by repeaters which amplifies and retransmits signals in both directions. Maximum distance between any 2 stations is 2500 m (with 5 segments each of 500 m) and no more than 4 repeaters can separate any 2 stations.

IEEE (Ethernet) Frame Format Preamble: 7 bytes long and contains the pattern …. This allows the receiver’s clock to synchronize with the sender’s clock. Start of frame (SOF): byte is and denotes the start of the frame. Addresses: These are the MAC addresses and 6 bytes each. These addresses are globally unique addresses for the NIC cards. E.g. 00:A0:C9:14:C8:29 (in hex). Length: how many bytes are present in the data field. Data: this is the IP packet carried in the Ethernet frame and can be bytes. Pad: field is used to pad out the frame in case the data field is less than 46 bytes since the frame must be at least 64 bytes long ( = 64 bytes)

IEEE (Ethernet) Performance Efficiency (line utilization) decreases as the number of stations trying to transmit (under heavy load) increases due to the increased probability of collisions. 30% line utilization (or 3 Mbps throughput) is considered heavy load. Larger the frame size the higher the efficiency or utilization (due to higher payload since the header size of the frame is fixed).E.g. for 1024 byte frame, efficiency is about 85% and for a 64-byte frame, efficiency is about 30%.

IEEE (Ethernet) Switch As traffic increases (due to increased number of stations) the LAN will eventually saturate. The solution is a switched LAN. The switch has a high-speed backplane and 4 to 32 plugin cards. Each card has 1 to 8 connectors for connections to stations. On possibility is that each plugin card can be a collision domain running CSMA/CD. So only 1 transmission/card is possible but all cards can be transmitting in parallel at 10 (or 100 or 1000) Mbps. The other possibility is that each input port is buffered and so incoming frames are stored in RAM on each card. This design allows all input ports to transmit in parallel at 10 (or 100 or 1000) Mbps. Collisions thus do not occur. Throughput approaches 10 (or 100 or 1000) Mbps.

IEEE (Ethernet) Switch

Why must the IEEE (Ethernet) frame be at least 64 bytes long? FRAME HAS : E THERNET H EADER = 18 B YTES [D ST M AC (6) + S RC M AC (6) + L ENGTH (2) +CRC(4)] M INIMUM D ATA P ORTION = 46 B YTES M INIMUM E THERNET F RAME S IZE = 64 B YTES F RAMES MUST BE AT LEAST 64 BYTES LONG, NOT INCLUDING THE PREAMBLE, SO, IF THE DATA FIELD IS SHORTER THAN 46 BYTES, IT MUST BE COMPENSATED BY THE P AD FIELD. T HE REASON FOR SPECIFYING A MINIMUM LENGTH LIES WITH THE COLLISION - DETECT MECHANISM. I N CSMA/CD A STATION MUST NEVER BE ALLOWED TO BELIEVE IT HAS TRANSMITTED A FRAME SUCCESSFULLY IF THAT FRAME HAS, IN FACT, EXPERIENCED A COLLISION. I N THE WORST CASE IT TAKES TWICE THE MAXIMUM PROPAGATION DELAY ACROSS THE NETWORK BEFORE A STATION CAN BE SURE THAT A TRANSMISSION HAS BEEN SUCCESSFUL.

Why must the IEEE (Ethernet) frame be at least 64 bytes long? Calculations: LAN Length (L) = 500 m (per segment) x 5 segments = 2500 meters Velocity of propagation on the cable (V) = 2 * 10 8 meters/sec Delay added by repeater (D) = ~3uSec x 2 (Bi-Direction) x 4 Repeaters = 24uSec Round Trip Delay (RTD) = (Total Distance/V) + Repeater Delays (D) Total Distance/V = (2*2500/2 * 10 8 ) = 25 * sec or 25usec Hence RTD = = 49 usec Now, time to transmit 64 bytes = 512 bits / 10 * 10 6 = sec or 51.2 usec (referred to as slot time in the 802.3) which is greater than the RTD of 49 usec. Hence the minimum frame size for the IEEE (Ethernet) is 64 bytes.

Fast Ethernet Fast Ethernet operates at 100Mbps. For the most part, the scheme/protocol remains the same as the 10Mbps case, except now the maximum length of the network is shortened. Maximum frame size is still kept at 64 bytes (for backward compatibility), which now arrive 10 times faster than they do in 10Mbps Ethernet. Hence the maximum length of the network must be 10 times smaller or about around 250 meters.

Ethernet Switch Hierarchy: Switch to Switch Upgrade

The connection between the switches was previously at 100 Mbps. To make the upgrade to Gigabit Ethernet, switches are replaced with new 100/1000 Mbps switching hardware, along with 1000 Mbps bandwidth between switches.

Ethernet Switch Hierarchy: Switch to Server Upgrade

The switch to server upgrade will include changing a current 100 Mbps switch to a 1 Gbps switch.

Gigabit Ethernet Carrier extension for 1 Gbps Ethernet.