17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.

Slides:



Advertisements
Similar presentations
LAN Technologies LAN TECHNOLOGIES.
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Fundamentals of Computer Networks ECE 478/578
The Data Link Layer introduction point-to-point data link protocols
Ethernet. Review Media Access Control – Broadcast media shared by all stations – MAC is used to determine who gets the right to send Developed protocol.
Channel Access Methods
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
The Data Link Layer Read Chapters 3 and 4. CSC 3352 Computer Communications Chapter 3&42 Where in the OSI Reference Model ? Session Transport Network.
EECC694 - Shaaban #1 lec #6 Spring Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: –Computers connected by communication.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
IEEE Standards, FDDI, Collision Free Protocols
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Chapter 4: Medium Access Control (MAC) Sublayer
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Medium Access Control Sub Layer
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Chapter 6 Multiple Radio Access
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Rehab AlFallaj.  Standards determine:  Techniques used in the networks.  Its protocols.  Network specifications and features.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 Ethernet History –developed by Xerox PARC in mid-1970s –roots in Aloha packet-radio network –standardized by Xerox, DEC, and Intel in 1978 –similar to.
The Medium Access Control Sublayer
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Week3 The Medium Access Sublayer
Chapter 12 Multiple Access.
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Net301 lecture9 11/5/2015 Lect 9 NET301.
The Medium Access Control Sublayer
Ethernet Neil Tang 9/17/2008 CS440 Computer Networks.
The Medium Access Control Sublayer
Computer Interfacing and Protocols
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Multiple Access Control (MAC) Protocols
Presentation transcript:

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices (e.g. office environment) Why “local”? –Volume of locally created data –Increasing local computation power –Advantage of locality: High Speed! Design goals: –High speed and high bandwidth –Simple, maintainable, flexible, extendable –Low cost

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 2 LAN Topologies Basic topologies revisited: Hub

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 3 Channel Access Line discipline is important factor of overall performance Static allocation of resources results in poor performance –From queuing theory: dividing resources in N equal parts multiplies the mean waiting time by N Polling vs. contention techniques –Polling: Asking everyone if they have something to send –Can be centralized or distributed (how?) –Contention: Try to access the channel without prior arrangement

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 4 Multiple Access Protocols Several different kinds of multiple access protocols exist: –Aloha Pure, slotted –Carrier Sense Multiple Access (CSMA) Persistent, non-persistent, p-persistent, CD –Collision-Free Protocols Bit map, binary count… –Limited Contention Protocols Adaptive tree walk… …

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 5 Pure Aloha Users send their frames as soon as they are available Collisions will occur, but wait for a random amount of time and send the frame once again A1 A2 B1 B2 C1 A B C

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 6 Pure Aloha Performance of Pure Aloha –When sending a frame, we hope that no one else is transmitting from 1 frame time before we start transmission until our transmission is over t0t0 t 0 +tt 0 +2tt 0 +3t Vulnerable period

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 7 Slotted Aloha Different from Pure Aloha in the timing of channel access Time is partitioned into slots When a host receives a frame, it waits until the beginning of the next slot to transmit The vulnerable period is reduced to half of Pure Aloha A maximum of one slot waiting time is possible

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 8 CSMA Protocols Based on sensing the channel before sending the frame Send the frame if channel is free Behavior after detecting a busy channel determines the kind of CSMA protocol –1-persistent: Send the frame if channel is available. If busy, transmit the frame with probability 1 as soon as the channel is free. If collision occurs, wait a random amount of time and start over –Nonpersistent: Send the frame if channel is available. If busy, wait a random amount of time and try sending once again

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 9 CSMA Protocols –P-persistent: Used in slotted channels. Send the frame with probability p if channel is available, defer to the next slot with probability 1-p. If busy, wait until the next slot and repeat the algorithm. CSMA protocols have higher throughput than Aloha protocols Nonpersistent protocol has higher throughput and delay than 1-persistent Performance of p-persistent depends on the value of p

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 10 CSMA/CD Carrier Sense Multiple Access / Collision Detection –Sense the channel before sending –If collision is detected, stop the transmission (frame is damaged anyway) –Wait for a random amount of time before the next attempt Collision detection is done by comparing the transmitted power to the received one

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 11 CSMA/CD How long does it take for a station to conclude that it seized the channel, i.e., what is the contention period? –Consider the worst case scenario –Largest propagation delay = τ –At t 0, station 1 starts sending –At t 0 + τ, station 2 sends its first bit, causes collision, stops sending –Station 1 detects collision at t 0 +2 τ –Hence, the contention period is 2 τ

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 12 Project Logical Link Control (LLC) Internetworking CSMA/CD Token Bus Token Ring... Project 802 Network Data Link Layer Physical OSI Model

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 13 Ethernet (802.3) Xerox, DEC, Intel Properties: –Simple, low cost, low delay –High speed (10, 100, 1000 Mbps) –Aims data exchange at data link level –Fairness in channel access –Single node, group, broadcast addressing –No unused fields, no variants –Stability: increase in offered traffic should not choke the system

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 14 Ethernet (802.3) Properties (not so attractive ones): –Not full duplex –Limited error control Detection of and recovery from collision Error detection using CRC, retransmissions left to higher level –No security integrated –Best effort service –No measures against malicious users

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 15 Ethernet (802.3) Limit on cable length –Minimum frame size is 64 bytes –At 10Mbps, it takes 51.2μsec to transmit the shortest frame –51.2μsec = 2 τ  2500 meter cable length –To achieve 1Gbps: Keep cable length at 2500m, minimum frame size becomes 6400 bytes Keep minimum frame size at 64 bytes, maximum cable length becomes 25m

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 16 Ethernet (802.3) Binary Exponential Backoff Algorithm –Slot time = 51.2μsec –When collision occurs, wait 0 or 1 slot time –If another collision occurs, wait a random number of slot times between 0 and 3 –After k th collision, randomly wait 0-(2 k -1) slot times –Maximum slot time to be waited is 1023 –Give up after 16 consecutive collisions

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 17 Ethernet (802.3) Frame format –Preamble used for sender/receiver clock synchronization –MSB of destination address marks single (0) or group communication (1) Preamble Destination Address Source Address DataPadChecksum Bytes Start of frame delimiter Length of data

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 18 Other Ethernet Networks Switched Ethernet: –Switch isolates communication between two stations –Medium is no longer truly broadcast medium Fast Ethernet: –Reduce the cable size to 250m, increase the speed to 100Mbps Gigabit Ethernet: –1Gbps speed –25m with cable, 550/5000m with multi/single mode optical fiber

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 19 Token Ring (802.5) Unidirectional ring Stations are either active or let the frames pass Medium access: –Station waits for token –Capture token and transmit your message instead –Wait until you get your own message, then place the token on the line

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 20 Token Ring (802.5) Token format Frame format SDACED SD/ED: Starting/Ending Delimiter AC: Access control 1 byte each SD Destination Address Source Address DataFCS 16 6No limit1 4 Bytes ACFCEDFS 1 11 Start of Frame Sequence FCS CoverageEnd of Frame Sequence FC: Frame Control FCS: Frame Check Sequence FS: Frame Status

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 21 Token Ring (802.5) Starting Delimiter: J K 0 J K –Violations of Differential Manchester encoding –J: Cancel both transitions –K: Cancel middle transition only Access Control: P P P T M R R R –P: Priority bits indicating which stations are allowed to use token –T: Token bit, 1 if token or abort, 0 if data or command –M: Monitor bit, used by active monitor station to detect orphan frames –R: Reservation bits to reserve the next token, cannot be set to less than priority of the frame  How does it ever decrease?

17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 22 Token Ring (802.5) Frame Control: –Used to distinguish data frames from control frames Frame Status: –Includes A and C bits –A is set when destination passes the frame –C is set when destination copies the frame AC=00: Destination not powered up or not present AC=10: Destination present, but frame not accepted AC=11: Destination present and frame accepted –Automatic acknowledgment of frames