UNDERSTANDING GIGABIT ETHERNET PERFORMANCE
|
|
- Angelica West
- 6 years ago
- Views:
Transcription
1 DATA COMMUNICATIONS MANAGEMENT UNDERSTANDING GIGABIT ETHERNET PERFORMANCE Gilbert Held INSIDE Ethernet Frame Flow; The Gigabit Ethernet Frame OVERVIEW Gigabit Ethernet represents the latest Institute of Electrical and Electronic Engineers (IEEE) Carrier Sense Multiple Access with Collision Detection (CSMA/CD) standard. In developing the Gigabit Ethernet standard, the IEEE decided that it was important to retain the CSMA/CD access protocol and frame format to provide a truly scalable technology, ranging from Ethernet s 10Mbps operating rate to the 100Mbps operating rate of Fast Ethernet and to the 1Gbps operating rate of Gigabit Ethernet. Retaining the same media access and frame format simplifies equipment design as the differences between each version of Ethernet become primarily one of speed adaptation on clocking. Unfortunately, retaining the frame structure of Ethernet and Fast Ethernet introduced a new problem in the form of a collision domain. Both Ethernet and Fast Ethernet provide sufficient time between the next-to-last bit in a frame being placed on a network and the receipt of a propagated collision signal to enable a cabling length of 100 meters from a workstation to a hub port. In a Gigabit Ethernet environment, the higher operating rate restricts the diameter of a network to approximately ten meters, as cabling beyond that distance closes the collision window and makes it possible for a station to transmit every bit in a frame while a PAYOFF IDEA Gigabit Ethernet represents an increase in the operating rate of Fast Ethernet by an order of magnitude. Although Gigabit Ethernet operates faster than Fast Ethernet, there are certain situations where the actual performance of the more modern technology may not provide any significant improvement when one considers the actual ability of each networking technology to transfer information. Thus, it is important for network managers and LAN administrators to understand how Gigabit Ethernet transfers data and those situations that inhibit its ability to transfer information. Knowing the operation of Gigabit Ethernet will allow one to select an appropriate networking technology to satisfy organizational requirements without basing the decision on the operating rate of the network, which, under certain situations, can result in the inability of the technology to satisfy organizational requirements. 08/99 Auerbach Publications 1999 CRC Press LLC
2 collision occurred on some prior bits and the collision signal is still propagating toward the transmitting station. Because a ten-meter diameter would be overly restrictive, the IEEE standardized a technique referred to as carrier extension technology that adds special symbols to the end of relatively short frames on a Gigabit network. While the resulting technique literally opens the collision window and permits a much more practical 200-meter network diameter, the carrier symbols occupy bandwidth and adversely affect the ability of Gigabit Ethernet to transport information per unit of time under certain conditions. Thus, the trade-off was between obtaining a reasonable network cabling diameter and lowering the ability of the network to transport information under certain network situations. It should be noted that carrier extension technology is only applicable to half-duplex, shared-media Gigabit Ethernet. This is because full-duplex, nonshared media Gigabit Ethernet uses separate paths for the transmission and reception of data, precluding the possibility of collisions. However, because shared-media Gigabit Ethernet is copper based and costs significantly less per port than full-duplex, nonshared media, it is reasonable to expect that many network managers and LAN administrators will focus their attention on the less expensive technology. After all, 1Gbps of shared media bandwidth represents a considerable improvement over 100Mbps Fast Ethernet. Or does it? To answer this question, one must first examine the potential frame flow on different types of Ethernet networks. ETHERNET FRAME FLOW Exhibit 1 illustrates the composition of an Ethernet frame. Note that the Data field must be a minimum of 46 bytes in length and is filled with pad characters if the number of bytes to be transported is less than 46. Thus, the minimum length of an Ethernet frame is 72 bytes. In some literature one may have read that the minimum length of an Ethernet frame is 64 bytes. That metric references the IEEE standard that defines the frame prior to its placement on the network at the physical layer. Because network adapter cards automatically add the Preamble and Start of Frame Delimiter fields that add eight bytes to the frame for synchronization, the minimum length of the frame as it flows on the network is 72 bytes. Returning to the Ethernet frame s Data field, its maximum value is 1500 bytes. When one considers the 26 overhead bytes in each frame, this means that the maximum frame length on the network is 1526 bytes. Many publications reference a maximum frame length of 1518 bytes. Once again, such publications are referencing the length of the frame prior to its placement on the network and do not consider the additional eight bytes added by the network adapter card in the form of a Preamble field and a Start of Frame Delimiter field for synchronization.
3 EXHIBIT 1 The Ethernet Frame Format
4 By understanding that the minimum length of an Ethernet frame is 72 bytes and its maximum length is 1526 bytes, one can compute the maximum number of minimum length and maximum number of maximum length frames that can flow on an Ethernet network. Because many readers may be from the Show Me state of Missouri, the computations are given here. At a 10Mbps operating rate, the Ethernet standard requires a dead time of 9.6 µs between frames, while the bit duration is 100 ns. Thus, the time required to transmit a 72 byte minimum length Ethernet frame becomes: 9.6 µs + 72 bytes 8 bits/byte 100 ns/bit or s. Thus, in one second, there can be a maximum of 1/ , or 14,880 minimum size 72-byte frames flowing on an Ethernet 10Mbps network. Similar to the manner by which the maximum number of minimum length frames that can flow on a 10Mbps Ethernet network was calculated, one can also compute the maximum number of maximum length frames that can flow on that network. To do, first compute the time per frame as follows: 9.6 µs bytes 8 bits/byte 100 ns/bit or 1.23 ns. Then, in one second, there can be a maximum of 1/1.23 ns or 812 maximum length frames that can flow on a 10Mbps Ethernet network. In examining Fast Ethernet technology, one notes that the dead times between frames and bit duration are one tenth of 10Mbps and that both technologies use the same frame format with the same minimum frame length of 72 bytes and maximum frame length of 1526 bytes. Due to this, the maximum frame rate obtainable on Fast Ethernet is ten times the frame rate of 10Mbps Ethernet. In addition to determining the maximum frame rate on Ethernet and Fast Ethernet, one can also compute their information transfer capability. To do so, multiply their maximum and minimum frame rates by the number of bytes capable of being transported in maximum length and minimum length frames. For example, consider the maximum frame rate when minimum length frames are transported on an Ethernet network. Since a minimum length 72 byte frame is capable of transporting 46 bytes and 14,880 minimum length frames per second can flow on an Ethernet network, the data transfer rate becomes: 14,880 frames/s 46 bytes/frame 8 bits/byte = 5.476Mbps
5 EXHIBIT 2 Ethernet Frame and Information Transfer Capability Average Frame Size (Bytes) Maximum Frame Rate Maximum Information Transfer Ethernet Mbps Mbps Fast Ethernet Mbps Mbps Similarly, one can also compute the information transfer capability of 10Mbps Ethernet for maximum length 1526-byte frames. Since a maximum of 812 frames per second can flow on that network and each maximum length field can transport 1500 bytes, then the maximum data transfer rate for maximum length frames becomes: 812 frames/s 1500 bytes/frame 8 bits/byte = 9.744Mbps Exhibit 2 summarizes the maximum frame rates and information transfer capability for minimum length and maximum length frames flowing on Ethernet and Fast Ethernet networks. Because Fast Ethernet uses the same frame format and only differs from Ethernet by placing bits on the network faster by an order of ten, its transfer rate is ten times that of Ethernet. Thus, although one could compute the information transfer of Fast Ethernet in the same manner as for the information transfer for Ethernet, this will not be done. Instead, note that because the maximum frame rate on Fast Ethernet is ten times that of Ethernet, this results in the information transfer capability also being ten times that of Ethernet. Returning to the examination of the entries in Exhibit 2, one can now focus on the maximum information transfer capability of Ethernet and Fast Ethernet. Note that when the minimum frame length occurs that corresponds to the transmission of frames carrying interactive traffic, the maximum information transfer on Ethernet and Fast Ethernet is slightly more than half of the operating rate of each network. At the opposite end of the range of frame lengths, the transmission of maximum length frames that corresponds to file transfers results in the information transfer rate approaching the operating rate of each network. Thus, the average frame length flowing on a network has a significant effect on the information transfer rate obtainable on an Ethernet network. With this in mind, one can focus on Gigabit Ethernet by first examining the extension of the Ethernet frame via the use of carrier extension technology.
6 THE GIGABIT ETHERNET FRAME As previously mentioned, the higher operating rate of Gigabit Ethernet resulted in the IEEE extending its frame through the use of carrier extension technology for shared-media, half-duplex operations. This frame extension occurs by the addition of carrier extension symbols to ensure all frames have a minimum length of 512 bytes in the adapter and 520 bytes when placed onto the network. Through the use of carrier extension technology, a 200-meter network diameter can be supported. Otherwise, the need to ensure that a station could hear a collision propagate on the network between transmitting the next-to-last bit in a short frame and the last bit in the frame would have significantly reduced the allowable cabling distance to 10 meters (or approximately 33 feet). Exhibit 3 illustrates the Gigabit Ethernet frame format. Note that the carrier extension extends the frame timing to guarantee at least a 512- byte slot time (520 bytes on the network) for half-duplex, shared-media operations. The increase in the minimum length frame does not change the frame size and only alters the time the frame is on the network. This enables compatibility to be maintained between Ethernet, Fast Ethernet, and Gigabit Ethernet. Although the carrier extension scheme permits the support of a more reasonable and practical network diameter, that extension is not without a price. That price is one of additional network bandwidth utilization by carrier extension symbols, which reduces the information transfer capability of Gigabit Ethernet when carrier extension symbols are required. One can determine the frame rate for Gigabit Ethernet in the same manner as for Ethernet; that is, first compute the transmission time required for placing a Gigabit Ethernet frame on the network. Once this is accomplished, divide that time into one second to determine the number of frames per second that can flow on the network. Because Gigabit Ethernet also has minimum length and maximum length frames, perform two computations to determine the maximum number of minimum length frames and maximum number of maximum length frames that can flow on a Gigabit network. Once this is accomplished, multiply the frame rates by the number of bytes in the Data field of each frame to compute the information transfer rate for minimum length and maximum length frames. Obtaining this information will illustrate the effect of transporting certain types of data on the performance of Gigabit Ethernet, which will in turn illustrate the importance of throughput above the operating rate of a network. To compute the frame rate on Gigabit Ethernet, note that the minimum length frame is now 520 bytes when placed on the network. Because carrier extension symbols are added to the end of an Ethernet frame, the actual composition of the frame is not altered. This means that the Data field will vary between 46 and 1500 bytes. Thus, the minimum number of bytes that can be transported in a minimum length Gigabit
7 EXHIBIT 3 Half-Duplex Gigabit Ethernet Using Carrier Extension to Extend Timing
8 Ethernet frame is 46, which is the same as Ethernet and Fast Ethernet. However, instead of being 72 bytes in length, the minimum frame is 520 bytes on the network to include 448 carrier extension symbols. To compute the maximum number of minimum length frames that can flow on a Gigabit Ethernet network, use a dead time between frames of µs, a frame length of 520 bytes, and a bit duration of 1 ns. Thus, the time per minimum length frame becomes: bytes 8 bits/byte 1 ns/bit = s Then, in one second, there can be a maximum of 1/ or 234,962 frames per second. Because each frame can transport up to 46 bytes of data, the maximum information transfer capability for minimum length Gigabit Ethernet frames becomes: 234,962 frames/s 46 bytes/frame 8 bits/byte = 86.46Mbps In comparing the value just computed to the entries in Exhibit 2, note that the ratio of Gigabit Ethernet s Information transfer to that of Fast Ethernet for minimum length frames is 86.46/54.76, or approximately 1.58 to 1. Thus, although Gigabit Ethernet s operating rate is ten times the operating rate of Fast Ethernet, when used to transport relatively short interactive queries, its information transfer capability is only slightly better than Fast Ethernet. A similar computation for the maximum length Gigabit frame shows that Gigabit Ethernet indeed provides ten times the information transfer capability of Fast Ethernet. This results from the fact that as the Data field increases, the number of carrier extensions decreases until a Data field transporting 494 or more bytes of data requires no carrier extension symbols and provides exactly ten times the information transfer capability of Fast Ethernet. Thus, for all frames with Data fields between 494 and 1500 bytes, half-duplex, shared-media Gigabit Ethernet provides what one would normally expect from the technology an information transfer rate ten times that of Fast Ethernet and 100 times that of Ethernet. RECOMMENDED COURSE OF ACTION While Gigabit Ethernet provides an operating rate ten times that of Fast Ethernet, its information transfer rate can be much lower. This means it is important to examine the type of data being transmitted on a network prior to considering the use of a shared-media, half-duplex Gigabit Ethernet backbone. If the organization s average frame length is relatively low, one may need to consider installing a more expensive, full-duplex Gigabit Ethernet backbone or consider an alternate technology such as ATM.
9 Gilbert Held is an internationally known author and lecturer. Gil is the author of over 40 books and 250 technical articles. Some of Gil s recent titles include Ethernet Networks, 3rd ed.; Data and Image Compression, 4th ed.; and Working with Network Based Images, all published by John Wiley & Sons of New York and Chichester, England. Gil can be reached via at @mcimail.com.
10- and 100-Mbps Ethernet
Ethernet Basics 10-Mbps Ethernet Three 10-Mbps Ethernet standards: 10BASE5 10BASE2 10BASE-T 10BASE2 and 10BASE5 were around more than 20 years and have been replaced by newer alternatives 10BASE-T s use
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationIEEE 802 LANs SECTION C
IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationLAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic
1 LAN Protocols Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8 CSE 3213, Fall 2015 Instructor: N. Vlajic What is LAN? 2 Local Area Network (LAN) properties private ownership freedom to choose/change/upgrade
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.
83 Chapter 6 Ethernet Technologies and Ethernet Switching Ethernet and its associated IEEE 802.3 protocols are part of the world's most important networking standards. Because of the great success of the
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................
More informationObjectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationMedia Access Control (MAC) Sub-layer and Ethernet
Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer
More informationEECS 122, Lecture 7. Kevin Fall Jean Walrand
EECS 122, Lecture 7 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu : Outline Typical Setup Names Physical Layer Frame Fast Ethernet; Gigabit Ethernet 10Base5 Efficiency of CSMA/CD
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises
More informationDATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE
51-10-06 DATA COMMUNICATIONS MANAGEMENT VIRTUAL LANS Gilbert Held INSIDE Definition, Rationale, Support for Virtual Networking Requirements, Facilitating Adds, Moves, and Changes, Enhancing Network Performance,
More information1. Data Link Layer (Layer 2)
1. Data Link Layer (Layer 2) The Data Link layer provides a means for exchanging data over a common local media. The Data Link layer performs two basic services: Allows the upper layers to access the media
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationCommunication and Networks. Problems
Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationCS 640 Lecture 4: 09/11/2014
CS 640 Lecture 4: 09/11/2014 A) Bandwidth-delay product B) Link layer intro C) Encoding, Framing, Error Detection D) Multiple access Ethernet A. Bandwidth-delay product This in the above example is C *
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationEthernet Technologies
Ethernet Technologies CCNA 1 v3 Module 7 NESCOT CATC 1 10 Mbps Ethernet Legacy Ethernet means: 10BASE5 10BASE2 10BASE-T Common features are: frame format timing parameters transmission process basic design
More informationNetwork Imaging Techniques Gilbert Held
51-20-60 Network Imaging Techniques Gilbert Held Payoff Supporting imaging applications does not necessarily require an expensive network upgrade. This article discusses several inexpensive, timesaving
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationMedium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology
Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable
More informationDirect Link Communication II: Wired Media. Multi-Access Communication
Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationData Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs
Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Hello and welcome to today s lecture on high speed
More informationBridging and Switching Basics
CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device
More informationIntroductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.
Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationDirect Link Communication II: Wired Media. Multi-Access Communication
Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used
More informationIntroduction to Computer Networks. IEEE Ethernet
Introduction to Computer Networks IEEE 802.3 Ethernet All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationLAN PROTOCOLS. Beulah A AP/CSE
LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety
More informationMedium Access Control Sublayer
Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationReview. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD
Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches
More informationTest Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair
Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/
More informationENGI 4557 Digital Communications Practice Problems 2017 (Part 2)
ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x
More informationPage 1 of 5 Print this Page Close this Window TECHNICAL ARTICLE: STANDARDS-BASED REAL TIME ETHERNET NOW OFF-THE-SHELF Almost every major user organisation is currently propagating its own Ethernet-based
More informationIntroduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and
High Speed LANs 3BA33 David Lewis 2 nd Semester 2006-07 3BA33 D.Lewis 2007 1 Characteristics of High Speed LANS 3BA33 D.Lewis 2007 3 Introduction Fast Ethernet and Gigabit Ethernet Fibre Channel High-speed
More informationChapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More informationPage 1 of 4 Close Window Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment Take Assessment - ENetwork Chapter 7 - CCNA Exploration: Network Fundamentals (Version 4.0)
More informationEthernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers
Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationThe Link Layer II: Ethernet
Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols
More informationEvaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held
5-02-30 Evaluating Client/Server Operating Systems: Focus on Windows NT Gilbert Held Payoff As organizations increasingly move mainframe-based applications to client/server platforms, Information Systems
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG
Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we
More informationLocal Area Network Overview
Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and
More informationComputer Networks. Lecture 8 Local Area Network, IEEE 802.x
Computer Networks Lecture 8 Local Area Network, IEEE 802.x Local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school,
More informationLAN Systems. Bus topology LANs
Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong
More informationCSCI 466 Midterm Networks Fall 2011
CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationChapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)
Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial
More informationThe Medium Access Control Sublayer
The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel
More informationIntroduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005
Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005 Network and Telecommunications Basics Chapter Outline The telecommunications system Network services
More information1. Broad Market Potential o Broad set(s) of applications o Multiple vendors, multiple users o Balance cost, LAN vs. attached stations 802.
1. Broad Market Potential o Broad set(s) of applications o Multiple vendors, multiple users o Balance cost, LAN vs. attached stations The fast growth of CPU speed is forcing the development of new LANs
More informationTopics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.
Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,
More informationCS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006
CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject
More informationCS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online
1 CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online Solutions 1. General Networking a. In traditional client-server communication using TCP, a new socket is created.
More informationCCNA Exploration Network Fundamentals. Chapter 09 Ethernet
CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services
More informationIntroduction to Ethernet. Guy Hutchison 8/30/2006
Introduction to Ethernet Guy Hutchison 8/30/2006 What is Ethernet? Local area transport protocol Layer 2 of the OSI stack Zero/minimal configuration Low-cost, high performance Best-effort delivery Original
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationLecture 05 Chapter 16 High Speed LANs
NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education
More informationFull file at
ch02 True/False Indicate whether the statement is true or false. 1. The number of nodes on a network and the length of cable used influence the quality of communication on the network. 2. Repeaters and
More informationInternet Architecture and Protocol
Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationLayer 2 functionality bridging and switching
Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How
More information- Hubs vs. Switches vs. Routers -
1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationThe random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure
Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More informationComputer Networks Principles LAN - Ethernet
Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2
More informationLecture (04) Data link layer
Lecture (04) Data link layer By: Dr. Ahmed ElShafee Standards Overview CSMA/CD Ethernet standards 10 base 5 10 base 2 10 base T Fast Ethernet Gigabit Ethernet ١ ٢ Standards Overview Like most protocols,
More informationC H A P T E R GIGABIT ETHERNET PROTOCOL
C H A P T E R GIGABIT ETHERNET PROTOCOL 2 39 2.1 Objectives of Research Ethernet protocol has been a robust and dominant technology and it is found to be present on more than 90 percent of all networked
More informationTechnically Speaking. James Antonakos
In this portion of his series, James walks us through the operation of Fast Ethernet and Gigabit Ethernet. Join him as he discusses each 100- and 1000-Mbps technology, looks at their individual encoding
More informationLecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationPerformance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation
Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Sanjay P. Ahuja, Kyle Hegeman, Cheryl Daucher Department of Computer and Information Sciences University
More informationCisco Networking Academy Curriculum - Semester Three Scope and Sequence
Cisco Networking Academy Curriculum - Semester Three Scope and Sequence Course Description: This is the third course in four courses designed to introduce new content and extend previously learned networking
More informationLecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,
More informationInfiniBand SDR, DDR, and QDR Technology Guide
White Paper InfiniBand SDR, DDR, and QDR Technology Guide The InfiniBand standard supports single, double, and quadruple data rate that enables an InfiniBand link to transmit more data. This paper discusses
More informationChapter 15 Local Area Network Overview
Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed
More informationShared Ethernet Networks
Lab 1 Shared Ethernet Networks Overview In a shared Ethernet network, end systems are typically connected together using a hub. The hub retransmits any incoming frames on all outgoing lines creating a
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationTopics Today. Lecture 8: Physical and Link Layers. Protocol Layering. Physical layer: chips versus bits. Physical Layer (Layer 1) Protocol Layering
Topics Today Physical layer: chips versus bits Lecture 8: Physical and Link Layers Link layer and media access control (MAC) Ethernet Hubs and Switches MPLS Protocol Layering Physical layer: chips versus
More informationChapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant
More informationIEEE Technical Tutorial. Introduction. IEEE Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
More informationEECS 122: Introduction to Communication Networks Final Exam Solutions
EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead
More informationECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII
ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing
More informationIntroduction to LAN Protocols
CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various
More informationPPP. Point-to-Point Protocol
PPP Point-to-Point Protocol 1 Introduction One of the most common types of WAN connection is the point-to-point connection. Point-to-point connections are used to connect LANs to service provider WANs,
More information1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.
/9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More information