Ethernet: Distributed Packet Switching for Local Computer Networks Authors: Robert M. Metcalfe and David R. Boggs Presentation: Christopher Peery.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
Multiple access What if multiple machines are sharing the same link?
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
ECE358: Computer Networks Spring 2012
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
1 Computer Communication & Networks Lecture 12 Datalink Layer: Multiple Access Waleed Ejaz
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Medium Access Control NWEN302 Computer Network Design.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Prof. John Nestor ECE Department Lafayette College Easton, Pennsylvania ECE Senior Design I Lecture 16 - Ethernet Fall.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Medium Access Control Sub Layer
Chapter 6 Multiple Radio Access
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
Ethernet. Ethernet (802.3) 1-persistent CSMA, CD, binary exponential backoff Carrier sense: station listens to channel first. 1-persistent: If idle, station.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 Ethernet History –developed by Xerox PARC in mid-1970s –roots in Aloha packet-radio network –standardized by Xerox, DEC, and Intel in 1978 –similar to.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
The Medium Access Control Sublayer
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
A Taxonomy of Mechanisms for Multi-Access
Multiple Access Methods
Lab 7 – CSMA/CD (Data Link Layer Layer)
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Multiple Access Mahesh Jangid Assistant Professor JVW University.
CS 457 – Lecture 6 Ethernet Spring 2012.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Multiple Access Methods
Ethernet Neil Tang 9/17/2008 CS440 Computer Networks.
Ethernet – CSMA/CD Review
7- chapter Seven Local Area Networks (LAN)
Multiple Access Methods
Computer Interfacing and Protocols
Chapter 6 Multiple Radio Access.
Dr. John P. Abraham Professor UTPA
Multiple Access Control (MAC) Protocols
Presentation transcript:

Ethernet: Distributed Packet Switching for Local Computer Networks Authors: Robert M. Metcalfe and David R. Boggs Presentation: Christopher Peery

Outline Quick Overview Design Choices Ethernet’s Behavior Limitations The Good Side of the Ether

Quick Overview So we probably all heard about it one time or another, so what is it? In brief, it’s a broadcast medium with no centralized control, that is used to interconnect computers in a localized area. Was greatly influenced by the Aloha Network used by the University of Hawaii. This was a satellite based communication system Exists as 10 Mbs, 100 Mbs, and 1 Gbps Uses 1-Persistent CSMA-CD (Carrier Sense Multiple Access – Collision Detection)

Design Choices Requirements: Was intended for allow localized communication among workstations Should be easily extensible Control should be completely decentralized to avoid creating a bottleneck Should be relatively inexpensive Ethernet will not make any absolute guarantees with respect to packet deliver. It is “best-effort”. Communication medium should be as simple as possible

Identification Each Ethernet packet contains a source and destination address. All packets reach every workstation on the segment Packets are filtered at the network interfaces There is a reserved address for broadcast

Ethernet Behaviour Ethernet can be examined in the following areas: Topology Control Collision detection

Topology Ethernet is a broadcast medium Workstations single attach themselves to the shared medium Imagine a straight line with workstations attached to it on either side. Several Ethernet segments can be connect in sequence using a device known as a repeater or a bridge (a little smarter then a repeater).

Control Control in Ethernet is completely decentralized. The medium has no control over who uses it. Its only task to to move information from point A to B. Is this good? Every time a workstation needs to transmit, it tries to take control of its Ethernet segment. This is done by listening to the shared medium to determined if it can be used and then actually using it. How does this work?

When to transmit… If a node want to transmit, it will first listen on the segment. If the node hears a transmission, it will wait for one transmission period for the sending node to finish. Then it will immediately attempt to send its data. This is known as deference. If the node hears no one sending, it will send immediately. The idea then once a node is transmitting, it effectively owns the segment is known as acquisition. This is 1-Persistent CSMA. Meaning when you detect a chance to transmit… do so with probability 1. What about collisions?

Collisions Handling If a collision is detected, the two sending nodes stop transmitting. Each node will then chose a new random slot from 2 k slots, where k is the number of collisions already suffered. This is done 16 times… then a failure is reported This call Binary Exponential Back-off Note for this to work… everyone has to play nicely The duration of the retransmission interval is computed using collision history. This allows it to change with the network load.

Detecting a Collision When a node sends a packet, it also listens to the segment to ensure the information is not damaged. This is collision detection. When a collision is detected the sending node will jam the Ether. This is done to guarantee that all sending nodes are made aware of the collision. Ethernet also specifies that a checksum be computer for each packet to detect errors from noise… this kind of an error does not result in a back-off.

Limitations Ethernet has been very successful but also has some limitations The Ethernet Standard specifies that up to most 5 segments may be connected with repeaters. Each segment at most 500m. 256 workstations can be attached to a given segment (this is never done in practice… why?) Most sys admins try to keep Ethernet segments at 60% utilization. Else they become unusable. The minimum packet size is determined by the segment bandwidth and length (RTT). Why is this?

The Good side of the Ether Good example of the End-to-End argument Completely distributed control Simple Easy Cheap