# Chapter 8 LAN Topologies

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines Advantages Univ. of Kentucky CS 471, Spring Jim Griffioen 1

2 P-t-P Networks: (continued) Disadvantages Univ. of Kentucky CS 471, Spring Jim Griffioen 2

3 Multiaccess Networks Problem: P-t-P networks have many lines => high cost Solution: IDEA: the computers must take turns we need an allocation strategy to determine who s turn it is (TDM, FDM, Statistical Multiplexing) Shared lines reduce cost But it means you only get a fraction of the line s bandwidth Univ. of Kentucky CS 471, Spring Jim Griffioen 3

4 LAN Topologies Networks are typically classified by their shape There are three popular shapes: Univ. of Kentucky CS 471, Spring Jim Griffioen 4

5 Bus Topologies Shared Bus Connector Wire Figure 2: Example Bus Topology Must solve the Channel Allocation Problem. Univ. of Kentucky CS 471, Spring Jim Griffioen 5

6 Ring Topologies Computers are connected in a closed loop/ring Packets Travel Around The Ring in Some Direction Figure 3: Example Ring Topology Univ. of Kentucky CS 471, Spring Jim Griffioen 6

7 All computers connect to Star Topologies If it is a multiaccess star, hosts must synchronize their sending. If hub does store-n-forwarding of messages, then hosts do not need to synchronize. Hub Figure 4: Example Star Topology Univ. of Kentucky CS 471, Spring Jim Griffioen 7

8 Why Multiple Topologies Each topology has advantages and disadvantages Advantages Bus: Ring: Star: Ring: Disadvantages Bus: Ring: Ring: Star: Univ. of Kentucky CS 471, Spring Jim Griffioen 8

9 Ethernet: A Bus Network is probably most popular LAN technology developed at Xerox PARC by R. Metcalf and D. Boggs 1976 DEC, Intel, and Xerox developed the DIX ethernet standard later IEEE defined the ethernet standard first versions ran at 3 Mbps current versions run at 10 Mbps and 100 Mbps is a multiaccess network technology is a broadcast-based technology is inexpensive because it uses a passive cable only provides best-effort service higher level protocols do all the real work comes in three varietys: thick net, thin net, twisted pair Univ. of Kentucky CS 471, Spring Jim Griffioen 9

10 Ethernet Basics Sending Animation Univ. of Kentucky CS 471, Spring Jim Griffioen 10

11 CSMA/CD Carrier Sense, Multiple Access with Collision Detection Ethernet is just one example of a CSMA/CD protocol The goal is to There is no THE BASIC IDEA of CSMA/CD protocols is: CSMA/CD Animation Univ. of Kentucky CS 471, Spring Jim Griffioen 11

12 Ethernet Collision Detection Note that CSMA does not prohibit two machines from sending at the same time! Consequently, their signals may collide How do you detect collisions? (Short Packet Animation) Univ. of Kentucky CS 471, Spring Jim Griffioen 12

13 Two Short Packets that will collide When Packets Collide, Garbage Results (see green line below) Red host sends: Blue host sends: Wire sees: Figure 5: Short Packets might not detect collision Univ. of Kentucky CS 471, Spring Jim Griffioen 13

14 Collision Detection: (continued) What should the minimum Length Packet be? (See min-length animation) What is the Round Trip Delay of and Ethernet? if we transmit for 51.2 usecs, we will have seen the first few bits of a colliding host before we get done transmitting thus the minimum transmission time = 51.2 usec minimum packet size = Univ. of Kentucky CS 471, Spring Jim Griffioen 14

15 Ethernet Transmission Algorithm wait till idle line, send immediately, and monitor you may only send 1500 bytes. Why? you must wait 9.6 usec before sending again if you detect a collision, continue sending a jam signal until the end of the 51.2 usec interval (the minimum packet length) to make sure everyone sees the collision. wait a certain (with slight randomness) amount of time and try again if you collide again, double the wait time, then try again, etc. called exponential backoff Univ. of Kentucky CS 471, Spring Jim Griffioen 15

16 Receiever Algorithm the ethernet card sees all packets sent over the ether the ethernet card runs in one of two modes: Univ. of Kentucky CS 471, Spring Jim Griffioen 16

17 LocalTalk LAN technology that uses bus topology Interface included with all Macintosh computers Relatively low speed (230.4 Kbps) Low cost ( free with a Macintosh); easy to install and connect Univ. of Kentucky CS 471, Spring Jim Griffioen 17

18 CSMA/CA LocalTalk uses collision avoidance rather than collision detection CA = Collision Avoidance Transmitting computer sends very short message to reserve bus If reservation succeeds, transmitter can use bus without conflict Univ. of Kentucky CS 471, Spring Jim Griffioen 18

19 Two popular examples: IBM Token Ring FDDI Example Ring Networks Univ. of Kentucky CS 471, Spring Jim Griffioen 19

20 IBM Token Ring network manages access to the shared ring via a token Univ. of Kentucky CS 471, Spring Jim Griffioen 20

21 forward packet s Token Ring Access Points Receiver Sender copy packet and forward Figure 6: (Left) Abstract Ring (Right) Ring in Operation Token Ring Animation Univ. of Kentucky CS 471, Spring Jim Griffioen 21

22 The Token The token is There is only A computer must hold the token Univ. of Kentucky CS 471, Spring Jim Griffioen 22

23 Token Passing Algorithm Univ. of Kentucky CS 471, Spring Jim Griffioen 23

24 Token Ring Failures What kinds of problems/failurs can occur? Univ. of Kentucky CS 471, Spring Jim Griffioen 24

25 FDDI (Fiber Distributed Data Interface) FDDI was a very popular ring technology Ran at 100 Mbps Still used in some places, but has been largely replaced by other technologies. Gigabit ring networks (follow-ons to FDDI) have also been developed (CSMA/RN) Univ. of Kentucky CS 471, Spring Jim Griffioen 25

26 Physical Characteristics runs over fiber an alternative version called CDDI runs over copper the attachment stations form a Dual, Counter-Rotating Ring Concentrator DAS SAS SAS Dual Attachment Station (Concentrator) 2 fibers in / 2 fibers out SAS hang off it expensive/complex To a To a Figure 7: Rings, DAS, and SAS only use the outer ring, the inner ring is idle until a failure occurs Univ. of Kentucky CS 471, Spring Jim Griffioen 26

27 Physical Characteristics: (continued) two types of attachments Dual Attachment Stations (DAS) Single Attachment Stations (SAS) the network is said to be self-healing a DAS has an optical by-pass that fixes SAS failures each DAS monitors connectivity and reverses the ring if a failure occurs X X X Figure 8: Self-Healing Capability Univ. of Kentucky CS 471, Spring Jim Griffioen 27

28 Physical Characteristics: (continued) has a bandwidth of 100 Mbps, latency depends on ring size max ring size is 100 Kilometers (really 200 Km / 2 rings) max dist between stations is 2 Km max of 500 stations each station adds a 50 ns delay because of an elasticity buffer. uses 4B/5B encoding max packet length is approx 4500 bytes Univ. of Kentucky CS 471, Spring Jim Griffioen 28

29 Token Rotation Algorithm you are allowed to send data as long as you hold the token How long can you hold the token? Univ. of Kentucky CS 471, Spring Jim Griffioen 29

30 Setting THT if (THT is small) if (THT is large) TTRT (Target Token Rotation Time) want a TTRT Target Token Rotation Time for the ring that is as big as possible to get the best efficiency, but small enough so that everyone is happy FDDI selects the minimum of all hosts desired TRT s as the ring s TTRT (vie a bidding algorithm) each machine tries to keep the token rotating at the TTRT speed Univ. of Kentucky CS 471, Spring Jim Griffioen 30

31 Setting THT: (continued) each hosts measures the last rotation time MTRT (Measured Token Rotation Time) if (MTRT < TTRT) the token is moving faster than it needs to you are allowed to hold the token for a maximum of THT = (TTRT - MTRT) if (MTRT >= TTRT) the token is behind schedule you must forfeit your turn and send the token on immediately Univ. of Kentucky CS 471, Spring Jim Griffioen 31

32 When do you send the token? Token Token Packet Packet Figure 9: When to send the Token? Univ. of Kentucky CS 471, Spring Jim Griffioen 32

33 Univ. of Kentucky CS 471, Spring Jim Griffioen 33

34 ATM (Asynchronous Transfer Mode) does not stand for Automated Teller Machine is a packet switching system spans the physical, data link, and network levels standards are still in development (CCITT and ATM forum) highly influenced by the Telephone industry a goal of ATM was to be able to send voice, data, and video over the same network (merge computer and voice networks) also need to carry control information (things needed to support new telephone services like call forwarding, call-waiting, discount dialing plans, etc) In the past this information ran over a parallel network to the voice network. Univ. of Kentucky CS 471, Spring Jim Griffioen 34

35 Goals and Assumptions 1. ATM networks will be organized as a two-level hierarchy consisting of user and network level machines/switches we need a network-network interface (NNI) and we need a user-network interface (UNI) 2. should provide connection-oriented service; set up a channel to communicate 3. should be run over fiber and have very low error rates subgoal is to provide Quality-of-Service such as guaranteed bandwidth, latency, interpacket arrival times, etc. can only do this is the communication links do not introduce errors 4. should allow low cost attachements (ATM telephone devices) standards body decided to prohibit cell reordering cells must arrive at the receiver in order across the link Univ. of Kentucky CS 471, Spring Jim Griffioen 35

36 this means end-point devices can be made with much simpler bufferring schemes in particular, they can use FIFO memory instead of RAM memory ATM telephones can just play the samples as they arrive ATM typically carried over some fiber-based data link layer like SONET uses cells (really just another term for packet) Univ. of Kentucky CS 471, Spring Jim Griffioen 36

37 What is a Cell? Recall that Packets can be any size (i.e., they adjust their size to fit the data) A Cell is just a fixed length packet (usually a small packet) Cells are always the same size (even if you want to send a single bit or byte) ATM uses 53 byte cells : 48 bytes of payload and 5 bytes of header Univ. of Kentucky CS 471, Spring Jim Griffioen 37

38 small packet caught behind big packet big packet divided into cells Time Packets can cause wasted bandwidth Figure 10: Cells have small queueing delays Univ. of Kentucky CS 471, Spring Jim Griffioen 38

39 Characteristics of ATM each switch is a star topology switches can by hooked together uses connection-oriented communication between machines destination identified by a connection id ATM ATM Figure 11: Example ATM Network Univ. of Kentucky CS 471, Spring Jim Griffioen 39

40 Pictures of Real ATM Switches Each machine uses two fiber optic lines to connect to the switch Typically multimode fiber is used running at 155 Mbps Figure 12: Fibers into back of a Sparc IPC Univ. of Kentucky CS 471, Spring Jim Griffioen 40

41 Pictures of Real ATM Switches Univ. of Kentucky CS 471, Spring Jim Griffioen 41

42 Univ. of Kentucky CS 471, Spring Jim Griffioen 42

### LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we

### CARRIER SENSE MULTIPLE ACCESS (CSMA):

Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

### Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

### Lecture 4b. Local Area Networks and Bridges

Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

### COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing

### CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

### ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.5: Ethernet Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer Networks

### Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

### Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory

### Networking Technologies and Applications

Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

### Lecture 6: Example LAN: Ethernet

Lecture 6: Example LAN: Ethernet Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Network Types Local Area Networks (LANs):privately-owned networks

### Lecture 6: Example LAN: Ethernet

Lecture 6: Example LAN: Ethernet Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Network Types Local Area Networks (LANs):privately-owned networks

### Data Link Layer, Part 5. Medium Access Control

CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

### Summary of MAC protocols

Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

### Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

### Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

### IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

### ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing

### Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link

### Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring. Networks: Local Area Networks

Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link

### Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

### Unit II. Part A (2 Marks)

Unit II Part A (2 Marks) 1. Differentiate fast Ethernet and Gigabit Ethernet. Fast Ethernet increased speed from 10 to 100 megabits per second (Mbit/s). Gigabit Ethernet was the next iteration, increasing

### Contention Protocols and Networks

4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

### Media Access Control (MAC) Sub-layer and Ethernet

Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer

Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

### Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed

### Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Introduction to LAN Topologies Cabling 2000, Cisco Systems, Inc. 3-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Media / Cabling Local Area Network Cabling

### Medium Access Protocols

Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

### CS4516 Advanced Computer Networks. Final Review

Final Review ------------------------------ Final Material Begins Here --------------------------- V. Local Area Networks A. "The Channel Allocation Problem" 1. assumptions B. LAN Performance Notation

### Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

### Part3. Local Area Networks (LAN)

Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

### Outline: Connecting Many Computers

Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

### ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework

### Principles behind data link layer services

Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

### Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations

### Introduction to Computer Networks. IEEE Ethernet

Introduction to Computer Networks IEEE 802.3 Ethernet All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,

### CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

### CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006 Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject

### CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

### Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media

### Computer Networks. Medium Access Sublayer (Part I)

Computer Networks Medium Access Sublayer (Part I) Topics Introduction Multiple Access Protocols Ethernet Wireless LAN Protocols Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction Remember,

### Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial

### Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

Direct Link Networks (II) Computer Networking Lecture 03 HKU SPACE Community College January 30, 2012 HKU SPACE CC CN Lecture 03 1/25 Outline Reliable Link Service Stop-and-Wait Sliding Window Media Access

### High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

### Computer and Network Security

CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:

### 1999, Scott F. Midkiff

Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams

### Redes de Computadores. Medium Access Control

Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

### Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

### Protocols for Multiaccess Networks

Protocols for Multiaccess Networks Hosts broadcast packets When a collision occurs, all transmitted packets are lost Lost packets have to be retransmitted => Need Multiaccess Protocol Model - Slotted Aloha

### COS 140: Foundations of Computer Science

COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

### CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the

### EE 122: Ethernet and

EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

### Multiple Access Channels

Multiple Access Channels Some Queuing Theory MAC: Aloha, ethernet Exponential backoff & friends LANs: Local Area Networks Goal: extend benefits of simple connection as far as possible Means: Share medium

### COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

### Zarządzanie sieciami telekomunikacyjnymi

Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Four data rates are

### LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

1 LAN Protocols Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8 CSE 3213, Fall 2015 Instructor: N. Vlajic What is LAN? 2 Local Area Network (LAN) properties private ownership freedom to choose/change/upgrade

### IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

### Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

Lecture 17: Design Technologies Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 17-1 Design Goals From the architecture and its components and simulation, we

### Data and Computer Communications

Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

### Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

### The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

### Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Computer Networks Lecture 8 Local Area Network, IEEE 802.x Local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school,

### A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer

### Ethernet. Networks: Ethernet 1

Ethernet Networks: Ethernet 1 Ethernet [DEC, Intel, Xerox] 1-persistent, CSMA-CD with Binary Exponential Backoff. Manchester encoding. Networks: Ethernet 2 Ethernet [operational in 1974] Initially 3 Mbps

### Chapter 10: Local Area Networks

Chapter 10: Local Area Networks MULTIPLE CHOICE 1. CSMA stands for: a. Client-Server Multi-Access c. Carrier Server Master Application b. Carrier Sense Multiple Access d. none of the above 2. The CD in

### Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

### CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

CSE 461: Multiple Access Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 Next Topic Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion

### CSE/EE 461 Wireless and Contention-Free Protocols

CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application

### Ethernet. Networks: Ethernet 1

Ethernet Networks: Ethernet 1 Ethernet [DEC, Intel, Xerox] 1-persistent, CSMA-CD with Binary Exponential Backoff Manchester encoding Networks: Ethernet 2 Ethernet [operational in 1974] Initially 3 Mbps

Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

### Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol

### Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

Part 3: Packet Switching and Gail Hopkins Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins Introduction Circuit Switching vs. Packet Switching LANs and shared media Star, bus and

### Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

### The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

### Communication (III) Kai Huang

Communication (III) Kai Huang Ethernet Turns 40 12/17/2013 Kai.Huang@tum 2 Outline Bus basics Multiple Master Bus Network-on-Chip Examples o SPI o CAN o FlexRay o Ethernet Basic OSI model Real-Time Ethernet

### Lecture (04) Data link layer

Lecture (04) Data link layer By: Dr. Ahmed ElShafee Standards Overview CSMA/CD Ethernet standards 10 base 5 10 base 2 10 base T Fast Ethernet Gigabit Ethernet ١ ٢ Standards Overview Like most protocols,

### Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Hello and welcome to today s lecture on high speed

### Internet Architecture and Protocol

Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport

### M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

### Lecture 9: Bridging & Switching"

Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link

### CSE/EE 461 Section 2

CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan

### Computer Communication Networks

Chapter 3 Computer Communication Networks Objective of this chapter: The performance of any distributed system is significantly dependent on its communication network. The performance of the computer network

### LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

### Principles behind data link layer services:

Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

### CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

### Chapter 9 Ethernet Part 1

Chapter 9 Ethernet Part 1 Introduction to Ethernet Ethernet Local Area Networks (LANs) LAN (Local Area Network) - A computer network connected through a wired or wireless medium by networking devices (s,

### Principles behind data link layer services:

Data link layer Goals: Principles behind data link layer services: Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control Example

### Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

### Internetworking Part 1

CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

### High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

High Speed LANs CS420/520 Axel Krings Page 1 High Speed LANs Range of technologies Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs CS420/520 Axel Krings Page 2 1 Why High Speed LANs? Office

### Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one

### ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

### IEEE standards for local area networks

IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta

### Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various