Lectures Ethernet

Size: px
Start display at page:

Download "Lectures Ethernet"

Transcription

1 Lectures Ethernet EECS 122 University of California Berkeley

2 Overview Robert Metcalfe at Xerox in Palo Alto developed the original Ethernet in Digital Equipment Corporation, Intel, and Xerox defined the 10-Mbps (DIX) versions in 1980 and IEEE published the IEEE802.3 standard in June Grand Junction developed Fast Ethernet (100Mbps) in 1992 that was standardized by IEEE in IEEE standardized Gigabit Ethernet in Gigabit Ethernet was standardized in These standard specify the physical layer, the MAC (media access control) sublayer, and the LLC (logical link control) sublayer. In addition, the standards define the rules for addressing and routing. EECS122 - COMMENTS

3 Ethernet Overview Physical Layer MAC Bridged Ethernet VLAN Link Aggregation XON/XOFF ETHERNET 2

4 Overview Typical Setup Names Operations Perspective ETHERNET - Overview 3

5 Typical Setup ETHERNET Overview -Typical 4

6 Names Structure [rate][modulation][media or distance] 10Base5 (10Mbps, baseband, coax, 500m) 10Base-T (10Mbps, baseband, twisted pair) 100Base-TX (100Mbps, baseband, 2 pair) 100Base-FX (100Mbps, baseband, fiber) 1000Base-CX for two pairs balanced copper cabling 1000Base-LX for long wavelength optical transmission 1000Base-SX for short wavelength optical transmission. Wireless: Wi-Fi = Versions: a, b, g ETHERNET Overview - Names 5

7 Operations Hub: Single Collision Domain MAC Protocol: Wait until silent (carrier sense) Transmit CSMA/CD If collision, wait random time & repeat ETHERNET Overview Operations 6

8 Operations Switch: No Collisions Multiple transmissions are possible Switch stores packets that wait for same output ETHERNET Overview Operations 7

9 Perspective Ethernet is wildly successful, partly due to low cost (compare with FDDI or Token Ring-- - see text book) Some issues: nondeterministic service no priorities min frame size may be large ETHERNET Overview - Perspective 8

10 Physical Layer ETHERNET Physical 9

11 Physical Ethernet 10 BaseT Fast Ethernet 100 BaseT Gigabit Ethernet 1000 Base x Data Rate 10 Mbps 100 Mbps 1000 Base Mbps (1 gigabit per second) Cat 5 UTP 100 m (min) 100 m 100 m STP/Coax 500 m 100 m 25 m Multimode Fiber 2 km 412 m (hd) 2 km (fd) 550 m Single-mode Fiber 25 km 20 km 5 km EECS122 - COMMENTS

12 Physical ETHERNET Physical 10

13 MAC: Media Access Control Frame Multiple Access ETHERNET -MAC 11

14 Frame 7 byte preamble: alternating 1/0 combination producing 10Mhz square wave [@ 10Mbps] for 5.6 µsec; used for receiver synchronization 1 byte SFD (start of frame delimiter) ETHERNET MAC Frame 12

15 Frame Length/Type field: Type (Ethernet) indicates type of data contained in payload issue: what is the length? Length field (802.3) type info follows frame header So, is it the type or length? Ethernet : types have values above 2048 (RFC894 for IP) 802.3: length (RFC1042 for IP) If length, next headers are LLC & SNAP (for IP) LLC (3 bytes): DSAP, SSAP, CTL SNAP (5 bytes): org code, type (above) ETHERNET MAC Frame 13

16 Frame Structure The frame structure has two possible versions: Type encapsulation: (The number between parentheses are the lengths in bytes of the fields.) [PRE (8) DA (8) SA (8) Type (2) Data ( ) FCS (4)]. PRE is the preamble, used for synchronization. DA is the destination address, SA the source address. The type (> 2,048) specifies the protocol above the LLC (e.g., IP, IPX, AppleTalk, etc.). Length encapsulation: [PRE (8) DA (8) SA (8) Length (2) DSAP (1) SSAP (1) Ctrl (1-2) Data Pad (if needed) FCS (4)]. DSAP is the destination service access point and specifies the process that gets the data at the destination. SSAP is the source service access point. The length specifies the length (0 1500) in bytes of the unpadded data. The padding makes sure that the size from the start of DSAP to the end of the padding is between 46 and 1500 bytes. EECS122 - COMMENTS

17 Multiple Access High-Level View Multiple Access Protocols Random Access Protocols Slotted ALOHA CSMA/CD ETHERNET MA 14

18 High-Level View Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals: High resource utilization Avoid starvation Simplicity (non-decentralized algorithms) ETHERNET MA High Level 15

19 Medium Access Protocols Channel partitioning Divide channel into smaller pieces (e.g., time slots, frequency) Allocate a piece to node for exclusive use Random access Allow collisions recover from collisions Taking-turns Tightly coordinate shared access to avoid collisions ETHERNET MA Protocols 16

20 Random Access protocols When node has packet to send Transmit at full channel data rate R. No a priori coordination among nodes Two or more transmitting nodes -> collision, Random access MAC protocol specifies: How to detect collisions How to recover from collisions Examples of random access MAC protocols: Slotted ALOHA CSMA and CSMA/CD ETHERNET MA Random 17

21 Slotted Aloha Time is divided into equal size slots (= packet transmission time) Node with new arriving pkt: transmit at beginning of next slot If collision: retransmit pkt in future slots with probability p, until successful. Success (S), Collision (C), Empty (E) slots ETHERNET MA S.Aloha 18

22 Slotted Aloha: Efficiency What is the maximum fraction of successful transmissions? Suppose N stations have packets to send Each transmits in slot with probability p Prob. successful transmission S is (very approximated analysis!): by a particular node: S = p (1-p) (N-1) by any of N nodes S = Prob (only one transmits) = N p (1-p) (N-1) 1/e = 0.37 ETHERNET MA S.Aloha 19

23 CSMA: Carrier Sense Multiple Access CS (Carrier Sense) means that each node can distinguish between an idle and a busy link Sender operations: If channel sensed idle: transmit entire packet If channel sensed busy, defer transmission Persistent CSMA: retry immediately with probability p when channel becomes idle Non-persistent CSMA: retry after a random time interval ETHERNET MA CSMA 20

24 CSMA: collisions spatial layout of nodes along ethernet Collisions can occur: propagation delay means two nodes may not hear each other s transmission Collision: entire packet transmission time wasted Note: role of distance and propagation delay in determining collision prob. ETHERNET MA CSMA 21

25 CSMA/CD (collision detection) Overview Timing Ethernet ETHERNET MA CSMA/CD 22

26 Overview Collisions detected within short time Colliding transmissions aborted, reducing channel wastage Easy in wired LANs: measure signal strengths, compare transmitted, received signals Difficult in wireless LANs ETHERNET MA CSMA/CD- Overview 23

27 Timing ETHERNET MA CSMA/CD- Timing 24

28 Ethernet Overview Collision Detection Minimum Frame Size Maximum Frame Size Operations Efficiency Addressing Fast Ethernet Gigabit Ethernet ETHERNET MA CSMA/CD- Ethernet 25

29 Overview Will discuss classical Ethernet primarily Single segments up to 500m; with up to 4 repeaters gives 2500m max length Baseband signals broadcast, Manchester encoding, 32-bit CRC for error detection Max 100 stations/segment, 1024 stations/ethernet ETHERNET MA CSMA/CD Ethernet Overview 26

30 Collision Detection CD circuit operates by looking for voltage exceeding a transmitted voltage Want to ensure that a station does not complete transmission prior to 1st bit arriving at farthest-away station Time to CD can thus take up to 2x{max prop. delay} A B time CD ETHERNET MA CSMA/CD Ethernet CD 27

31 Minimum Frame Size Speed of light is about 4µs/km in copper So, max Ethernet signal prop time is about 10 µsec, or 20µsec RTT With repeaters, etc requires 51usec, corresponding to 512 bit-times Thus, minimum frame size is 512 bits (64 bytes); also called slot time ETHERNET MA CSMA/CD Ethernet Minimum 28

32 Maximum Frame Size 1500 byte limitation on maximum frame transmission size We will call this the MTU limits maximum buffers at receiver allows for other stations to send also requires 96 bit Inter-Packet-Gap (IPG) ETHERNET MA CSMA/CD Ethernet Maximum 29

33 Operations When ready & line idle, await IPG (96 bit times) and send while listening (CD) If CD true, send max 48-bit jamming sequence and do exponential backoff Jamming sequence used to inform all stations that a collision has occurred ETHERNET MA CSMA/CD Ethernet Operations 30

34 Operations For retransmission N (1<=N<=10) choose k at random on U(0..2^N-1) wait k * (51.2µsec) to retransmit send on idle; repeat on another collision for (11<=N<=15), use U( ) if N = 16, drop frame Longer wait implies lower priority (strategy is not fair ) ETHERNET MA CSMA/CD Ethernet Operations 31

35 Operations: Capture Effect Given two stations A & B, unfair strategy can cause A to continue to win Assume A & B always ready to send: if busy, both wait, send and collide suppose A wins, B backs off next time, B s chances of winning are halved ETHERNET MA CSMA/CD Ethernet Operations 32

36 Efficiency Typical Sequence of Events: Average = 5T T = max.prop.time between 2 nodes Average = L/R seconds L = average packet length Wait Random Successful Transmission Time Collision L/R Efficiency = = 1/(1 + 5a) Start L/R + 5T Transmitting a = T/(L/R) = RT/L ETHERNET MA CSMA/CD Ethernet Efficiency 33

37 Efficiency a impacts what happens during simultaneous transmission: a small early collision detection Efficient a = RT/L eff = 1/(1 + 5a) a large late detection Inefficient Example 1: 10Mbps, 1000m => T = (1km)(4µs/km) = 4µs; RT = 400 bits L = 4000 bits, say 5a = 2000/4000 = 0.5 => efficiency = 66% Example 2: 1Gbps, 200m => T = (0.2km)((4µs/km) = 0.8µs; RT = 800 bits L = 4000 bits; 5a = 4000/4000 = 1 => efficiency = 50% ETHERNET MA CSMA/CD Ethernet Efficiency 34

38 Efficiency - Analysis Model: Slot = 2T N stations compete by transmitting with probability p, independently If success => transmit L bits If failure (idle or collision), try next slot P(success) = P(exactly 1 out of N transmits) = Np(1 p) N-1 Indeed: N possibilities of station that transmits P(one given station transmits, others do not) = p(1 p) N-1 ETHERNET MA CSMA/CD Ethernet Efficiency 35

39 Efficiency - Analysis Average = A Slot = 2T success P(success) = Np(1 p) N-1 Assume backoff algorithm results in best p = 1/N => P(success) 1/e = 0.36 Average time until success: A = 0.36x x(2T + A) => A = 1.28T/0.36 = 3.5T In practice, backoff not quite optimal => 5T ETHERNET MA CSMA/CD Ethernet Efficiency 36

40 Efficiency of CSMA/CD Consider a discrete-time model where N stations compete for time slots with duration S. In this model, the stations transmit independently, with probability p each, in every time slot. If a single station transmits in a slot, then it keeps transmitting a full packet with duration T. If more than a station transmits, they all stop and the slot is wasted. The probability that a slot is "successful" is then Np(1 - p)^{n - 1}. The maximum over p occurs for p = 1/N and the optimal value is close to 1/e where e = If A designates the average number of slots wasted until the first successful slot, then A = 0(1/e) + (1 + A)(1-1/e). Solving for A, one finds A = e - 1 = 1.7. Consequently, the transmission of a packet which should take T seconds takes on average T + 1.7S seconds. The value of S is an upper bound on a round-trip propagation time on the network. The rationale for optimizing over p is that the actual algorithm uses an exponential back off scheme that achieve a throughput close to the optimal. However, all this is rather approximate. EECS122 - COMMENTS

41 Addressing 48 bit Ethernet/MAC/Hardware Addresses Prefix assigned per-vendor by IEEE Unique per-adapter, burned in ID PROM Multicast & Broadcast (all 1 s) addresses Many adapters support promiscuous mode ETHERNET MA CSMA/CD Ethernet Addressing 37

42 Addressing - Multicast Each vendor assignment supports 2^24 individual and group (multicast) addresses Each adapter supports multiple group subscriptions usually implemented as hash table thus, software may have to filter at higher layer ETHERNET MA CSMA/CD Ethernet Addressing 38

43 Fast Ethernet Fast Ethernet (1995) adds: 10x speed increase (100m max cable length retains min 64 byte frames) replace Manchester with 4B/5B (from FDDI) full-duplex operation using switches speed & duplex auto-negotiation ETHERNET MA CSMA/CD Ethernet Fast 39

44 Gigabit Ethernet IEEE 802.3{z,ab} 1000 Mb/s Gigabit Ethernet (1998,9) adds: 100x speed increase carrier extension (invisible padding...) packet bursting ETHERNET MA CSMA/CD Ethernet GE 40

45 Bridged Ethernets Objectives No-Frills Bridge Learning Bridge Spanning Tree Algorithm Bridge Limitations ETHERNET Bridged 41

46 Objectives Bridges interconnect network segments at the link layer (layer 2) Handle any layer 3 protocol (incl. non-routable ones); some can interconnect different media Mostly for LANs, also used in WANs (2 half bridges on ends of pt-to-pt links ETHERNET Bridged Objectives 42

47 Objectives Extending LANs Extending (interconnecting) multiple LANs. Appears as single LAN to layer 3. Essentially accepts and forwards all frames Benefits: extend number of stations extend size limit interfering traffic H B B R ETHERNET Bridged Objectives 43

48 No-Frills Bridge Interconnect 2 or more LAN segments Listens in promiscuous mode, buffers packets and transmits them on other interfaces when able On average, still cannot exceed link bandwidth bridge copies all traffic small bursts accommodated in buffers B ETHERNET Bridged No Frills 44

49 Learning Bridge Bridges learn which interfaces reach which end stations could do this by hand, but a hassle best if this happens transparently Learn by watching source addresses in frames senders usually use their own addresses (note that bridges don t!) ETHERNET Bridged Learning 45

50 Learning Bridge Listen promiscuously for all traffic Store (src addr, port) tuple in station cache for each new sender observed For each received frame: try to match frame dest to cache src entry not there->send on all interfaces except rcv is there->send on indicated, or filter if same as rcv interface Age cache entries ETHERNET Bridged Learning 46

51 Learning The switch must learn the MAC addresses of the NICs attached to each of its ports. If one switch port is attached to a hub, then a number of NICs are effectively attached to that port. The switch makes a list of the NICs addresses by watching the source addresses of the packets that arrive at the port. EECS122 - COMMENTS

52 Learning Bridge Example A B A 1 C D B 1 ETHERNET Bridged Learning 47

53 Learning Bridge Example C D A B A 1 E F D 3 ETHERNET Bridged Learning 48

54 Spanning Tree Algorithm Loops hurt! Spanning Tree Algorithm Example Topology Change ETHERNET Bridged STA 49

55 Spanning Tree To prevent frame duplications when there are multiple paths between pairs of hosts in a collection of bridged Ethernets, the bridges implement the spanning tree protocol. Unfortunately, the spanning tree protocol is slow to reconfigure after failure (one minute is typical) and it uses only one possible path that is typically inefficient. EECS122 - COMMENTS

56 Loops Hurt With redundant paths, bridges can loop traffic can happen forever (example) with more than 2, can cascade Cascade each bridge with N interfaces may produce up to N -2 new copies! ETHERNET Bridged STA Loops Hurt 50

57 Spanning Tree Consider LAN a graph G = (E, V), with LANs as vertices, and bridges as edges Spanning Tree: A spanning tree of an undirected, connected graph G is a subgraph which is both a tree and contains all vertices in G Thus, the ST will throw out some edges and be cycle-free Purpose will be to provide a single path to reach each network Generally, graphs have many STs Must be a distributed algorithm Can result in some bridges not forwarding at all! ETHERNET Bridged STA Spanning Tree 51

58 Algorithm Each bridge will decide over which ports it will forward frames bridges have unique addresses per port ports are also numbered by each bridge bridges have a single unique identifier (e.g. the lowest address) Ultimately Steps Root of tree = bridge with smallest ID Tree = shortest paths to root Resolve ties in favor of link to bridge with smallest ID Send [ my ID current root ID my distance to current root ] Update when receive smaller root ID ETHERNET Bridged STA Algorithm 52

59 Example 4 [2 1 1] B2 B1 3 [1 1 0] 1 [3 3 0] 5 [3 1 2] B3 B4 B6 6 [6 1 1] B5 2 [5 3 1] Format: [my ID current root ID distance to current root] ETHERNET Bridged STA Example 53

60 Topology Change Want to inform all bridges, but without having traffic scale as # of bridges Operation bridges noticing change send message on root port toward root root config messages subsequently contain topology changed flag ETHERNET Bridged STA Topology Change 54

61 Limitations Scale: not very realistic to interconnect more than 10 s of LANs Heterogeneity: really works best for homogeneous systems All broadcasts and multicasts are flooded ETHERNET Bridged Limitations 55

62 VLAN Virtual LAN A A B C A C B A, B, C A, B, C A B C Each port belongs to a set of VLANs and transmits only packets that belong to these VLANs ETHERNET VLAN 56

63 Link Aggregation Links are combined. Hello protocol determines which links are working and transmits across working links. ETHERNET VLAN 57

64 XON/XOFF 2 - XOFF 2 - XOFF 1 - Saturated XON/XOFF is a backpressure scheme designed to prevent nodes from saturating links. Unfortunately, in its present version, the scheme is not very effective it stops too many flows. ETHERNET XON/XOFF 58

65 Wireless (802.11) Overview Physical MAC Summary ETHERNET

66 Overview Designed for use in limited geographical area (i.e., couple of hundreds of meters) Designed for three physical media (run at either 1Mbps or 2 Mbps) Two based on spread spectrum radio One based on diffused infrared ETHERNET Overview 60

67 Physical Frequency hoping (OFDM) Transmit the signal over multiple frequencies The sequence of frequencies is pseudo-random, i.e., both sender and receiver use the same algorithm to generate their sequences Direct sequence (DSSS) Represent each bit by multiple (e.g., n) bits in a frame; XOR signal with a pseudo-random generated sequence with a frequency n times higher Infrared signal Sender and receiver do not need a clear line of sight Limited range; order of meters ETHERNET Physical 61

68 Physical b DSSS: 1, 2, 5.5, or 11 Mbps (depending on SNR) 2.4GHz Each channel occupies 22MHz There are 11 channels, but only 3 non-overlapping ones (1, 6, 11) Max. power = 1W a OFDM: 6, 9, 12, 18, 24, 36, 48, 54 Mbps (last 3 are optional) 5GHz 12 channels Max. power = 40mW, 200mW, 800mW (depending on freq.) ETHERNET Physical 62

69 Physical g OFDM: 6, 12, 24, 18, 36, 48, 54 Mbps (last 4 are optional) 2.4GHz Backward compatible with b 3 non-overlapping channels ETHERNET Physical 63

70 MAC: The Problems Reachability is not transitive: if A can reach C, and C can reach D, it doesn t necessary mean that A can reach D A B C D Hidden nodes: A and C send a packet to B; neither A nor C will detect the collision! Exposed node: B sends a packet to A; C hears this and decides not to send a packet to D (despite the fact that this will not cause interference)! ETHERNET MAC 64

71 MAC: RTS/CTS sender RTS CTS data ACK receiver other node in sender s range Before every data transmission Sender sends a Request to Send (RTS) frame containing the length of the transmission Receiver respond with a Clear to Send (CTS) frame Sender sends data Receiver sends an ACK; now another sender can send data When sender doesn t get a CTS back, it assumes collision ETHERNET MAC 65

72 MAC: CSMA/CA CA instead of CD: cannot listen while transmitting NAV: Network Allocation Vector: time until channel will become available transmitted in every frame Distributed Coordinated Function: Before transmitting Check if channel is busy, or In an interval between frames [as determined from NAV], or In an interval reserved for retransmission of an erroneous frame [as determined from previous transmission]. If one of the above, exponential backoff; else transmit. Centralized Controlled Access Mechanism: A point coordinator (in access point) coordinates transmissions. Stations request that the PC puts them in polling list Periodically, PC polls stations for traffic. Without hidden terminal; with hidden terminal ETHERNET MAC 66

73 Summary Arbitrate between multiple hosts sharing a common communication media Wired solution: Ethernet (use CSMA/CD protocol) Detect collisions Backoff exponentially on collision Wireless solution: Use MACA protocol Cannot detect collisions; try to avoid them ETHERNET Summary 67

Ethernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain

Ethernet. Typical Setup. Names. Operations. Operations Switch: No Collisions EECS 122. Hub: Single Collision Domain Overview Physical Layer MAC Bridged VLAN Link Aggregation XON/XOFF 802.11 Summary Overview Typical Setup Names Operations Perspective TOC TOC Overview Typical Setup Names Structure [rate][modulation][media

More information

EECS 122, Lecture 7. Kevin Fall Jean Walrand

EECS 122, Lecture 7. Kevin Fall Jean Walrand EECS 122, Lecture 7 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu : Outline Typical Setup Names Physical Layer Frame Fast Ethernet; Gigabit Ethernet 10Base5 Efficiency of CSMA/CD

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Contents. Telecom Systems Chae Y. Lee. Typical Setup Physical Layer Names 10Base5 CSMA/CD Frame Fast Ethernet; Gigabit Ethernet Perspective

Contents. Telecom Systems Chae Y. Lee. Typical Setup Physical Layer Names 10Base5 CSMA/CD Frame Fast Ethernet; Gigabit Ethernet Perspective Ethernet Contents Typical Setup Physical Layer Names 10Base5 CSMA/CD Frame Fast Ethernet; Gigabit Ethernet Perspective 2 Ethernet - Typical Setup 3 Ethernet Physical Layer UTP Unshielded twisted pair Up

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Wireless (WLAN) Medium Access Control Sublayer Mahalingam Mississippi State University, MS October 20, 2014 Outline Medium Access Protocols Wireless (WLAN) 1 Medium Access Protocols ALOHA Slotted ALOHA

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Chapter 4: The Medium Access Layer

Chapter 4: The Medium Access Layer Chapter 4: The Medium Access Layer Computer Networks Maccabe Computer Science Department The University of New Mexico September 2002 Medium Access Layer Point-to-point versus broadcast networks Broadcast

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr. Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology Medium Access Control CSCI370 Lecture 5 Michael Hutt New York Institute of Technology The Data Link Layer Logical Link Control (LLC) IEEE 802.2 Standard RFC 1042 Provides three service options Unreliable

More information

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon 15-441 Computer Networking Lecture 5 Data link Layer Access Control Based on slides by Peter Steenkiste Copyright, Carnegie Mellon 2007-12 1 Datalink Functions Framing: encapsulating a network layer datagram

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Computer Networks Principles LAN - Ethernet

Computer Networks Principles LAN - Ethernet Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 The

More information

IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 8 The Data Link Layer part I Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router,

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs A note on the use of these ppt slides: All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 4 th edition.

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Multiple Access Channels

Multiple Access Channels Multiple Access Channels Some Queuing Theory MAC: Aloha, ethernet Exponential backoff & friends LANs: Local Area Networks Goal: extend benefits of simple connection as far as possible Means: Share medium

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Midterm Review. Topics. Review: Network. Review: Network. Layers & Protocols. Review: Network WAN. Midterm Review EECS 122 EECS 122

Midterm Review. Topics. Review: Network. Review: Network. Layers & Protocols. Review: Network WAN. Midterm Review EECS 122 EECS 122 Topics Midterm Review EECS University of California Berkeley Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:

More information

Midterm Review EECS 122. University of California Berkeley

Midterm Review EECS 122. University of California Berkeley Midterm Review EECS University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi Network Layer Addressing Routing EECS Midterm Review Review:

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack

Data Link Protocols. TCP/IP Suite and OSI Reference Model. The TCP/IP protocol stack does not define the lower layers of a complete protocol stack Data Link Protocols TCP/IP Suite and OSI Reference Model The TCP/IP protocol stack does not define the lower layers of a complete protocol stack In this lecture, we will address how the TCP/IP protocol

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Chapter 4. The Medium Access Control Sublayer

Chapter 4. The Medium Access Control Sublayer Chapter 4 The Medium Access Control Sublayer The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs and

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring used

More information

CSE 461 Multiple Access. David Wetherall

CSE 461 Multiple Access. David Wetherall CSE 461 Multiple Access David Wetherall djw@cs.washington.edu How to share a link Multiplexing = networking term for sharing a resource among multiple users (e.g., link, protocol instance) Topics: Multiplexing

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48 Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework

More information

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols Link Layer: Introduction daptors ommunicating Terminology: hosts and routers are nodes communication channels that connect adjacent nodes along communication path are links wired links wireless links LNs

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)

More information

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 CSE 461: Multiple Access Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 Next Topic Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

The Link Layer II: Ethernet

The Link Layer II: Ethernet Monday Recap The Link Layer II: Ethernet q Link layer services q Principles for multiple access protocols q Categories of multiple access protocols CSC 249 March 24, 2017 1 2 Recap: Random Access Protocols

More information

Midterm Review EECS 122. University of California Berkeley

Midterm Review EECS 122. University of California Berkeley Midterm Review EECS 122 University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi 2 Review: Network WAN MAN 3 Review: Network WAN MAN

More information

Chapter 5: Link layer

Chapter 5: Link layer Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:

More information

Introduction to Computer Networks. IEEE Ethernet

Introduction to Computer Networks. IEEE Ethernet Introduction to Computer Networks IEEE 802.3 Ethernet All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30 EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Chapter V: Link Layer

Chapter V: Link Layer Chapter V: Link Layer UG3 Computer Communications & Networks (COMN) Myungjin Lee myungjin.lee@ed.ac.uk Slides copyright of Kurose and Ross Link layer services framing, link access: encapsulate datagram

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer

More information

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018 WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Spring'15 1 Next week Announcements April 14: ICN (Spencer Sevilla) April 16: DTN

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

Unit II. Part A (2 Marks)

Unit II. Part A (2 Marks) Unit II Part A (2 Marks) 1. Differentiate fast Ethernet and Gigabit Ethernet. Fast Ethernet increased speed from 10 to 100 megabits per second (Mbit/s). Gigabit Ethernet was the next iteration, increasing

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks

More information

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017 CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology

More information

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4. Topics for Today More on Ethernet Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet Wireless LANs Readings 4.3 to 4.4 1 Original Ethernet Wiring Heavy coaxial cable, called thicknet,

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

CSE/EE 461 Wireless and Contention-Free Protocols

CSE/EE 461 Wireless and Contention-Free Protocols CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information