UNDERSTANDING GIGABIT ETHERNET PERFORMANCE

Size: px
Start display at page:

Download "UNDERSTANDING GIGABIT ETHERNET PERFORMANCE"

Transcription

1 DATA COMMUNICATIONS MANAGEMENT UNDERSTANDING GIGABIT ETHERNET PERFORMANCE Gilbert Held INSIDE Ethernet Frame Flow; The Gigabit Ethernet Frame OVERVIEW Gigabit Ethernet represents the latest Institute of Electrical and Electronic Engineers (IEEE) Carrier Sense Multiple Access with Collision Detection (CSMA/CD) standard. In developing the Gigabit Ethernet standard, the IEEE decided that it was important to retain the CSMA/CD access protocol and frame format to provide a truly scalable technology, ranging from Ethernet s 10Mbps operating rate to the 100Mbps operating rate of Fast Ethernet and to the 1Gbps operating rate of Gigabit Ethernet. Retaining the same media access and frame format simplifies equipment design as the differences between each version of Ethernet become primarily one of speed adaptation on clocking. Unfortunately, retaining the frame structure of Ethernet and Fast Ethernet introduced a new problem in the form of a collision domain. Both Ethernet and Fast Ethernet provide sufficient time between the next-to-last bit in a frame being placed on a network and the receipt of a propagated collision signal to enable a cabling length of 100 meters from a workstation to a hub port. In a Gigabit Ethernet environment, the higher operating rate restricts the diameter of a network to approximately ten meters, as cabling beyond that distance closes the collision window and makes it possible for a station to transmit every bit in a frame while a PAYOFF IDEA Gigabit Ethernet represents an increase in the operating rate of Fast Ethernet by an order of magnitude. Although Gigabit Ethernet operates faster than Fast Ethernet, there are certain situations where the actual performance of the more modern technology may not provide any significant improvement when one considers the actual ability of each networking technology to transfer information. Thus, it is important for network managers and LAN administrators to understand how Gigabit Ethernet transfers data and those situations that inhibit its ability to transfer information. Knowing the operation of Gigabit Ethernet will allow one to select an appropriate networking technology to satisfy organizational requirements without basing the decision on the operating rate of the network, which, under certain situations, can result in the inability of the technology to satisfy organizational requirements. 08/99 Auerbach Publications 1999 CRC Press LLC

2 collision occurred on some prior bits and the collision signal is still propagating toward the transmitting station. Because a ten-meter diameter would be overly restrictive, the IEEE standardized a technique referred to as carrier extension technology that adds special symbols to the end of relatively short frames on a Gigabit network. While the resulting technique literally opens the collision window and permits a much more practical 200-meter network diameter, the carrier symbols occupy bandwidth and adversely affect the ability of Gigabit Ethernet to transport information per unit of time under certain conditions. Thus, the trade-off was between obtaining a reasonable network cabling diameter and lowering the ability of the network to transport information under certain network situations. It should be noted that carrier extension technology is only applicable to half-duplex, shared-media Gigabit Ethernet. This is because full-duplex, nonshared media Gigabit Ethernet uses separate paths for the transmission and reception of data, precluding the possibility of collisions. However, because shared-media Gigabit Ethernet is copper based and costs significantly less per port than full-duplex, nonshared media, it is reasonable to expect that many network managers and LAN administrators will focus their attention on the less expensive technology. After all, 1Gbps of shared media bandwidth represents a considerable improvement over 100Mbps Fast Ethernet. Or does it? To answer this question, one must first examine the potential frame flow on different types of Ethernet networks. ETHERNET FRAME FLOW Exhibit 1 illustrates the composition of an Ethernet frame. Note that the Data field must be a minimum of 46 bytes in length and is filled with pad characters if the number of bytes to be transported is less than 46. Thus, the minimum length of an Ethernet frame is 72 bytes. In some literature one may have read that the minimum length of an Ethernet frame is 64 bytes. That metric references the IEEE standard that defines the frame prior to its placement on the network at the physical layer. Because network adapter cards automatically add the Preamble and Start of Frame Delimiter fields that add eight bytes to the frame for synchronization, the minimum length of the frame as it flows on the network is 72 bytes. Returning to the Ethernet frame s Data field, its maximum value is 1500 bytes. When one considers the 26 overhead bytes in each frame, this means that the maximum frame length on the network is 1526 bytes. Many publications reference a maximum frame length of 1518 bytes. Once again, such publications are referencing the length of the frame prior to its placement on the network and do not consider the additional eight bytes added by the network adapter card in the form of a Preamble field and a Start of Frame Delimiter field for synchronization.

3 EXHIBIT 1 The Ethernet Frame Format

4 By understanding that the minimum length of an Ethernet frame is 72 bytes and its maximum length is 1526 bytes, one can compute the maximum number of minimum length and maximum number of maximum length frames that can flow on an Ethernet network. Because many readers may be from the Show Me state of Missouri, the computations are given here. At a 10Mbps operating rate, the Ethernet standard requires a dead time of 9.6 µs between frames, while the bit duration is 100 ns. Thus, the time required to transmit a 72 byte minimum length Ethernet frame becomes: 9.6 µs + 72 bytes 8 bits/byte 100 ns/bit or s. Thus, in one second, there can be a maximum of 1/ , or 14,880 minimum size 72-byte frames flowing on an Ethernet 10Mbps network. Similar to the manner by which the maximum number of minimum length frames that can flow on a 10Mbps Ethernet network was calculated, one can also compute the maximum number of maximum length frames that can flow on that network. To do, first compute the time per frame as follows: 9.6 µs bytes 8 bits/byte 100 ns/bit or 1.23 ns. Then, in one second, there can be a maximum of 1/1.23 ns or 812 maximum length frames that can flow on a 10Mbps Ethernet network. In examining Fast Ethernet technology, one notes that the dead times between frames and bit duration are one tenth of 10Mbps and that both technologies use the same frame format with the same minimum frame length of 72 bytes and maximum frame length of 1526 bytes. Due to this, the maximum frame rate obtainable on Fast Ethernet is ten times the frame rate of 10Mbps Ethernet. In addition to determining the maximum frame rate on Ethernet and Fast Ethernet, one can also compute their information transfer capability. To do so, multiply their maximum and minimum frame rates by the number of bytes capable of being transported in maximum length and minimum length frames. For example, consider the maximum frame rate when minimum length frames are transported on an Ethernet network. Since a minimum length 72 byte frame is capable of transporting 46 bytes and 14,880 minimum length frames per second can flow on an Ethernet network, the data transfer rate becomes: 14,880 frames/s 46 bytes/frame 8 bits/byte = 5.476Mbps

5 EXHIBIT 2 Ethernet Frame and Information Transfer Capability Average Frame Size (Bytes) Maximum Frame Rate Maximum Information Transfer Ethernet Mbps Mbps Fast Ethernet Mbps Mbps Similarly, one can also compute the information transfer capability of 10Mbps Ethernet for maximum length 1526-byte frames. Since a maximum of 812 frames per second can flow on that network and each maximum length field can transport 1500 bytes, then the maximum data transfer rate for maximum length frames becomes: 812 frames/s 1500 bytes/frame 8 bits/byte = 9.744Mbps Exhibit 2 summarizes the maximum frame rates and information transfer capability for minimum length and maximum length frames flowing on Ethernet and Fast Ethernet networks. Because Fast Ethernet uses the same frame format and only differs from Ethernet by placing bits on the network faster by an order of ten, its transfer rate is ten times that of Ethernet. Thus, although one could compute the information transfer of Fast Ethernet in the same manner as for the information transfer for Ethernet, this will not be done. Instead, note that because the maximum frame rate on Fast Ethernet is ten times that of Ethernet, this results in the information transfer capability also being ten times that of Ethernet. Returning to the examination of the entries in Exhibit 2, one can now focus on the maximum information transfer capability of Ethernet and Fast Ethernet. Note that when the minimum frame length occurs that corresponds to the transmission of frames carrying interactive traffic, the maximum information transfer on Ethernet and Fast Ethernet is slightly more than half of the operating rate of each network. At the opposite end of the range of frame lengths, the transmission of maximum length frames that corresponds to file transfers results in the information transfer rate approaching the operating rate of each network. Thus, the average frame length flowing on a network has a significant effect on the information transfer rate obtainable on an Ethernet network. With this in mind, one can focus on Gigabit Ethernet by first examining the extension of the Ethernet frame via the use of carrier extension technology.

6 THE GIGABIT ETHERNET FRAME As previously mentioned, the higher operating rate of Gigabit Ethernet resulted in the IEEE extending its frame through the use of carrier extension technology for shared-media, half-duplex operations. This frame extension occurs by the addition of carrier extension symbols to ensure all frames have a minimum length of 512 bytes in the adapter and 520 bytes when placed onto the network. Through the use of carrier extension technology, a 200-meter network diameter can be supported. Otherwise, the need to ensure that a station could hear a collision propagate on the network between transmitting the next-to-last bit in a short frame and the last bit in the frame would have significantly reduced the allowable cabling distance to 10 meters (or approximately 33 feet). Exhibit 3 illustrates the Gigabit Ethernet frame format. Note that the carrier extension extends the frame timing to guarantee at least a 512- byte slot time (520 bytes on the network) for half-duplex, shared-media operations. The increase in the minimum length frame does not change the frame size and only alters the time the frame is on the network. This enables compatibility to be maintained between Ethernet, Fast Ethernet, and Gigabit Ethernet. Although the carrier extension scheme permits the support of a more reasonable and practical network diameter, that extension is not without a price. That price is one of additional network bandwidth utilization by carrier extension symbols, which reduces the information transfer capability of Gigabit Ethernet when carrier extension symbols are required. One can determine the frame rate for Gigabit Ethernet in the same manner as for Ethernet; that is, first compute the transmission time required for placing a Gigabit Ethernet frame on the network. Once this is accomplished, divide that time into one second to determine the number of frames per second that can flow on the network. Because Gigabit Ethernet also has minimum length and maximum length frames, perform two computations to determine the maximum number of minimum length frames and maximum number of maximum length frames that can flow on a Gigabit network. Once this is accomplished, multiply the frame rates by the number of bytes in the Data field of each frame to compute the information transfer rate for minimum length and maximum length frames. Obtaining this information will illustrate the effect of transporting certain types of data on the performance of Gigabit Ethernet, which will in turn illustrate the importance of throughput above the operating rate of a network. To compute the frame rate on Gigabit Ethernet, note that the minimum length frame is now 520 bytes when placed on the network. Because carrier extension symbols are added to the end of an Ethernet frame, the actual composition of the frame is not altered. This means that the Data field will vary between 46 and 1500 bytes. Thus, the minimum number of bytes that can be transported in a minimum length Gigabit

7 EXHIBIT 3 Half-Duplex Gigabit Ethernet Using Carrier Extension to Extend Timing

8 Ethernet frame is 46, which is the same as Ethernet and Fast Ethernet. However, instead of being 72 bytes in length, the minimum frame is 520 bytes on the network to include 448 carrier extension symbols. To compute the maximum number of minimum length frames that can flow on a Gigabit Ethernet network, use a dead time between frames of µs, a frame length of 520 bytes, and a bit duration of 1 ns. Thus, the time per minimum length frame becomes: bytes 8 bits/byte 1 ns/bit = s Then, in one second, there can be a maximum of 1/ or 234,962 frames per second. Because each frame can transport up to 46 bytes of data, the maximum information transfer capability for minimum length Gigabit Ethernet frames becomes: 234,962 frames/s 46 bytes/frame 8 bits/byte = 86.46Mbps In comparing the value just computed to the entries in Exhibit 2, note that the ratio of Gigabit Ethernet s Information transfer to that of Fast Ethernet for minimum length frames is 86.46/54.76, or approximately 1.58 to 1. Thus, although Gigabit Ethernet s operating rate is ten times the operating rate of Fast Ethernet, when used to transport relatively short interactive queries, its information transfer capability is only slightly better than Fast Ethernet. A similar computation for the maximum length Gigabit frame shows that Gigabit Ethernet indeed provides ten times the information transfer capability of Fast Ethernet. This results from the fact that as the Data field increases, the number of carrier extensions decreases until a Data field transporting 494 or more bytes of data requires no carrier extension symbols and provides exactly ten times the information transfer capability of Fast Ethernet. Thus, for all frames with Data fields between 494 and 1500 bytes, half-duplex, shared-media Gigabit Ethernet provides what one would normally expect from the technology an information transfer rate ten times that of Fast Ethernet and 100 times that of Ethernet. RECOMMENDED COURSE OF ACTION While Gigabit Ethernet provides an operating rate ten times that of Fast Ethernet, its information transfer rate can be much lower. This means it is important to examine the type of data being transmitted on a network prior to considering the use of a shared-media, half-duplex Gigabit Ethernet backbone. If the organization s average frame length is relatively low, one may need to consider installing a more expensive, full-duplex Gigabit Ethernet backbone or consider an alternate technology such as ATM.

9 Gilbert Held is an internationally known author and lecturer. Gil is the author of over 40 books and 250 technical articles. Some of Gil s recent titles include Ethernet Networks, 3rd ed.; Data and Image Compression, 4th ed.; and Working with Network Based Images, all published by John Wiley & Sons of New York and Chichester, England. Gil can be reached via at @mcimail.com.

10- and 100-Mbps Ethernet

10- and 100-Mbps Ethernet Ethernet Basics 10-Mbps Ethernet Three 10-Mbps Ethernet standards: 10BASE5 10BASE2 10BASE-T 10BASE2 and 10BASE5 were around more than 20 years and have been replaced by newer alternatives 10BASE-T s use

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple

More information

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic 1 LAN Protocols Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8 CSE 3213, Fall 2015 Instructor: N. Vlajic What is LAN? 2 Local Area Network (LAN) properties private ownership freedom to choose/change/upgrade

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 83 Chapter 6 Ethernet Technologies and Ethernet Switching Ethernet and its associated IEEE 802.3 protocols are part of the world's most important networking standards. Because of the great success of the

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Media Access Control (MAC) Sub-layer and Ethernet

Media Access Control (MAC) Sub-layer and Ethernet Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer

More information

EECS 122, Lecture 7. Kevin Fall Jean Walrand

EECS 122, Lecture 7. Kevin Fall Jean Walrand EECS 122, Lecture 7 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu : Outline Typical Setup Names Physical Layer Frame Fast Ethernet; Gigabit Ethernet 10Base5 Efficiency of CSMA/CD

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE 51-10-06 DATA COMMUNICATIONS MANAGEMENT VIRTUAL LANS Gilbert Held INSIDE Definition, Rationale, Support for Virtual Networking Requirements, Facilitating Adds, Moves, and Changes, Enhancing Network Performance,

More information

1. Data Link Layer (Layer 2)

1. Data Link Layer (Layer 2) 1. Data Link Layer (Layer 2) The Data Link layer provides a means for exchanging data over a common local media. The Data Link layer performs two basic services: Allows the upper layers to access the media

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Communication and Networks. Problems

Communication and Networks. Problems Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

CS 640 Lecture 4: 09/11/2014

CS 640 Lecture 4: 09/11/2014 CS 640 Lecture 4: 09/11/2014 A) Bandwidth-delay product B) Link layer intro C) Encoding, Framing, Error Detection D) Multiple access Ethernet A. Bandwidth-delay product This in the above example is C *

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Ethernet Technologies

Ethernet Technologies Ethernet Technologies CCNA 1 v3 Module 7 NESCOT CATC 1 10 Mbps Ethernet Legacy Ethernet means: 10BASE5 10BASE2 10BASE-T Common features are: frame format timing parameters transmission process basic design

More information

Network Imaging Techniques Gilbert Held

Network Imaging Techniques Gilbert Held 51-20-60 Network Imaging Techniques Gilbert Held Payoff Supporting imaging applications does not necessarily require an expensive network upgrade. This article discusses several inexpensive, timesaving

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Hello and welcome to today s lecture on high speed

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr. Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used

More information

Introduction to Computer Networks. IEEE Ethernet

Introduction to Computer Networks. IEEE Ethernet Introduction to Computer Networks IEEE 802.3 Ethernet All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2)

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2) ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x

More information

Page 1 of 5 Print this Page Close this Window TECHNICAL ARTICLE: STANDARDS-BASED REAL TIME ETHERNET NOW OFF-THE-SHELF Almost every major user organisation is currently propagating its own Ethernet-based

More information

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and High Speed LANs 3BA33 David Lewis 2 nd Semester 2006-07 3BA33 D.Lewis 2007 1 Characteristics of High Speed LANS 3BA33 D.Lewis 2007 3 Introduction Fast Ethernet and Gigabit Ethernet Fibre Channel High-speed

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

Page 1 of 4 Close Window Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment Take Assessment - ENetwork Chapter 7 - CCNA Exploration: Network Fundamentals (Version 4.0)

More information

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

The Link Layer II: Ethernet

The Link Layer II: Ethernet Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols

More information

Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held

Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held 5-02-30 Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held Payoff As organizations increasingly move mainframe-based applications to client/server platforms, Information Systems

More information

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x Computer Networks Lecture 8 Local Area Network, IEEE 802.x Local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school,

More information

LAN Systems. Bus topology LANs

LAN Systems. Bus topology LANs Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong

More information

CSCI 466 Midterm Networks Fall 2011

CSCI 466 Midterm Networks Fall 2011 CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial

More information

The Medium Access Control Sublayer

The Medium Access Control Sublayer The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel

More information

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services

More information

1. Broad Market Potential o Broad set(s) of applications o Multiple vendors, multiple users o Balance cost, LAN vs. attached stations 802.

1. Broad Market Potential o Broad set(s) of applications o Multiple vendors, multiple users o Balance cost, LAN vs. attached stations 802. 1. Broad Market Potential o Broad set(s) of applications o Multiple vendors, multiple users o Balance cost, LAN vs. attached stations The fast growth of CPU speed is forcing the development of new LANs

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006 CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject

More information

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online 1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.

More information

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services

More information

Introduction to Ethernet. Guy Hutchison 8/30/2006

Introduction to Ethernet. Guy Hutchison 8/30/2006 Introduction to Ethernet Guy Hutchison 8/30/2006 What is Ethernet? Local area transport protocol Layer 2 of the OSI stack Zero/minimal configuration Low-cost, high performance Best-effort delivery Original

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

Lecture 05 Chapter 16 High Speed LANs

Lecture 05 Chapter 16 High Speed LANs NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. The number of nodes on a network and the length of cable used influence the quality of communication on the network. 2. Repeaters and

More information

Internet Architecture and Protocol

Internet Architecture and Protocol Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

Computer Networks Principles LAN - Ethernet

Computer Networks Principles LAN - Ethernet Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2

More information

Lecture (04) Data link layer

Lecture (04) Data link layer Lecture (04) Data link layer By: Dr. Ahmed ElShafee Standards Overview CSMA/CD Ethernet standards 10 base 5 10 base 2 10 base T Fast Ethernet Gigabit Ethernet ١ ٢ Standards Overview Like most protocols,

More information

C H A P T E R GIGABIT ETHERNET PROTOCOL

C H A P T E R GIGABIT ETHERNET PROTOCOL C H A P T E R GIGABIT ETHERNET PROTOCOL 2 39 2.1 Objectives of Research Ethernet protocol has been a robust and dominant technology and it is found to be present on more than 90 percent of all networked

More information

Technically Speaking. James Antonakos

Technically Speaking. James Antonakos In this portion of his series, James walks us through the operation of Fast Ethernet and Gigabit Ethernet. Join him as he discusses each 100- and 1000-Mbps technology, looks at their individual encoding

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation

Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Sanjay P. Ahuja, Kyle Hegeman, Cheryl Daucher Department of Computer and Information Sciences University

More information

Cisco Networking Academy Curriculum - Semester Three Scope and Sequence

Cisco Networking Academy Curriculum - Semester Three Scope and Sequence Cisco Networking Academy Curriculum - Semester Three Scope and Sequence Course Description: This is the third course in four courses designed to introduce new content and extend previously learned networking

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

InfiniBand SDR, DDR, and QDR Technology Guide

InfiniBand SDR, DDR, and QDR Technology Guide White Paper InfiniBand SDR, DDR, and QDR Technology Guide The InfiniBand standard supports single, double, and quadruple data rate that enables an InfiniBand link to transmit more data. This paper discusses

More information

Chapter 15 Local Area Network Overview

Chapter 15 Local Area Network Overview Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed

More information

Shared Ethernet Networks

Shared Ethernet Networks Lab 1 Shared Ethernet Networks Overview In a shared Ethernet network, end systems are typically connected together using a hub. The hub retransmits any incoming frames on all outgoing lines creating a

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

Topics Today. Lecture 8: Physical and Link Layers. Protocol Layering. Physical layer: chips versus bits. Physical Layer (Layer 1) Protocol Layering

Topics Today. Lecture 8: Physical and Link Layers. Protocol Layering. Physical layer: chips versus bits. Physical Layer (Layer 1) Protocol Layering Topics Today Physical layer: chips versus bits Lecture 8: Physical and Link Layers Link layer and media access control (MAC) Ethernet Hubs and Switches MPLS Protocol Layering Physical layer: chips versus

More information

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant

More information

IEEE Technical Tutorial. Introduction. IEEE Architecture

IEEE Technical Tutorial. Introduction. IEEE Architecture IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle

More information

EECS 122: Introduction to Communication Networks Final Exam Solutions

EECS 122: Introduction to Communication Networks Final Exam Solutions EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead

More information

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

PPP. Point-to-Point Protocol

PPP. Point-to-Point Protocol PPP Point-to-Point Protocol 1 Introduction One of the most common types of WAN connection is the point-to-point connection. Point-to-point connections are used to connect LANs to service provider WANs,

More information

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing. /9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information