Data Link Layer -2- Network Access

Similar documents
Data Link Layer -2- Network Access

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L5 Data link (part 2)

Data Link Layer: Collisions

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Chapter 12 Multiple Access 12.1

Multiple Access. Data Communications and Networking

COS 140: Foundations of Computer Science

Lecture 6: Example LAN: Ethernet

LAN PROTOCOLS. Beulah A AP/CSE

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Unit 7 Media Access Control (MAC)

Redes de Computadores. Medium Access Control

Ethernet. Introduction. CSE 3213 Fall 2011

Data and Computer Communications

Multiple Access Protocols

Contention Protocols and Networks

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

COS 140: Foundations of Computer Science

Chapter 4. The Medium Access Control Sublayer

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

CSMA/CD (Collision Detection)

CARRIER SENSE MULTIPLE ACCESS (CSMA):

ECE 4450:427/527 - Computer Networks Spring 2017

Local Area Networks (LANs) SMU CSE 5344 /

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Chapter 6 Medium Access Control Protocols and Local Area Networks

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Access Technologies! Fabio Martignon

CMPE 257: Wireless and Mobile Networking

Data Link Layer, Part 3 Medium Access Control. Preface

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

CMPE 257: Wireless and Mobile Networking

CSE 461: Multiple Access Networks. This Lecture

The Medium Access Control Sublayer

COMMUNICATION NETWORKS NETW 501

Medium Access Control Sublayer Chapter 4

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Link Layer and Ethernet

Link Layer and Ethernet

ECEN 5032 Data Networks Medium Access Control Sublayer

Lecture 05 Chapter 16 High Speed LANs

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Networking Technologies and Applications

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Data Link Layer, Part 5. Medium Access Control

MULTIPLE ACCESS PROTOCOLS 2. 1

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Local Networks. Lecture 4 6-Apr-2016

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

ECE 158A: Lecture 13. Fall 2015

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Protocols for Multiaccess Networks

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

EE 122: Ethernet and

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

The Link Layer and LANs. Chapter 6: Link layer and LANs

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Data Link Layer Technologies

Data and Computer Communications. Chapter 11 Local Area Network

CSE/EE 461 Wireless and Contention-Free Protocols

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Multiple Access Links and Protocols

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Chapter 5 Link Layer and LANs

Introduction to LAN Protocols

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

Media Access Control. Networked Systems (H) Lecture 5

Ethernet. Networks: Ethernet 1

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

Medium Access Control Sublayer Chapter 4

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

CSE 461 Multiple Access. David Wetherall

Medium Access Control Sublayer

Computer Networks Principles LAN - Ethernet

Aloha and slotted aloha

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Module 5 Local Area Networks

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Mohamed Khedr.

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Link Layer: Retransmissions

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Computer Networks. Medium Access Sublayer (Part I)

Transcription:

EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür

Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control Detect error Retransmit Framing 2

Data link layer Principles of digital communications From electrical signals to bits to packets Using the physical infrastructure Network access Finding your way Addressing, routing Making use of it all Applications 3

Internet: Data Link Layer (2) Medium Access Control Sublayer Access methods [F12.1-2] Ethernet [S12.1-2][ F13.1-5] Wireless local area networks [S13.1-3][ F15.1-2] *[Kihl & Andersson: 5.1-6] 4

Local Area Networks (LAN) Typically limited in size Traditionally shared-medium Designed for private areas Offices Campuses Homes 5

Conventional LAN topologies Mesh Bus Star Ring 6

Concept of shared medium Past Not for wired media any longer Wireless LAN (WLAN) share wireless medium. Present 7

Shared medium characteristics Broadcast All data reaches all stations Attenuation The network has a limited size. Extending the link Repeaters amplify signal on link 8

Data transfer on a shared medium Packet to C A B C D The computer with the right destination address copies the packet and delivers it to the application. 9

Medium Access Control (MAC) Set of rules for sending (and receiving) data in a multiple access network 10

Controlled access protocols Stations consult one another to find which station has the right to send. A station cannot send unless it has been authorized by other stations. Used in different parts of the mobile networks. 11

Controlled access: Reservation Time is divided into intervals. A reservation frame precedes the data frames. Stations need to make a reservation before sending data. 12

Controlled access: Polling One Primary Station (Master) Others are Secondary Stations (Slaves) Master controls the link. Slaves follow instructions. All data exchange is through the master. 13

Poll and Select functions If the primary station has anything to send, it uses a Select function. If it wants to receive data it uses a Poll function. 14

Controlled access: Token Passing Stations organized in a logical ring Token A special packet circulating through the ring Only a station holding the token can use the link. A station can only possess the token for a certain time, then it must release and pass the token on. 15

Random access protocols No station superior to another No station in control of another A station with data to send uses a procedure to decide whether or not to send 16

17

Random access: ALOHA Multiple-access method of ALOHANET One of the first WLAN in the world Devloped by the University of Hawaii (1970) Mainframe (Oahu) ALOHANET 18

Pure ALOHA Stations share one frequency band Mainframe sends data on another frequency (broadcast channel) A station sends a frame whenever it has a frame to send. If the station receives an ACK from the mainframe on the broadcast channel, the transmission is successful. If not, the frame needs to be retransmitted. 19

Pure ALOHA: Frames 20

Pure ALOHA: Resend strategy After a collision Wait a random time and resend (backoff time T B ) After K max attempts give up and try later (abort) T B Example: In binary exponential backoff the backoff time is chosen to be 0, T B U 2 k 1 T f where k is the attempt number. 21

Pure ALOHA: Collisions 22

Slotted ALOHA Time divided into slots Each slot contains one frame in time A station can only send at the beginning of a slot. 23

Slotted ALOHA: Frames 24

Slotted ALOHA: Colllisions 25

Carrier Sense Multiple Access (CSMA) Listen to (sense) medium before sending If medium occupied (busy), wait 1-persistent Non-persistent P-persistent 26

Persistence methods Keep sensing and send as soon as channel idle Wait random, sense again, send if idle Transmit with probability p, sense with 1-p, wait if busy 27

CSMA: Vulnerable time Propagation time Collisions? 28

CSMA with Collision Detection (CSMA/CD) CSMA has no collision procedure CSMA/CD developed to handle collisions 29

CSMA/CD: Collision detection Monitors medium after sending a frame Abort transmission and send a jamming signal if collision detected 30

CSMA/CD: Minimum frame size Sending station must be able to detect a collision before transmitting the frame s last bit Frame transmission time must be at least two times maximum propagation time Colliding signal can propagate to sending station before the last bit is transmitted. 31

See you in 15 :) After the break Ethernet MAC addresses Wireless LAN 32

IEEE s LAN standards (Project 802) 33

IEEE 802.3: Ethernet Created 1976 by Xerox Evolved through new versions Access networks Backbone networks 34

Ethernet frame structure 35

Standard Ethernet implementations CSMA/CD 36

Standard Ethernet implementations CSMA/CD 37

Evolution of Ethernet Collision domains CSMA/CD 38

Switched Ethernet CSMA/CD 39

Full-duplex switched Ethernet CSMA/CD 40

Even more Ethernet evolution Fast 100 Mbps Gigabit 1 000 Mbps 10-Gigabit Metropolitan More and better wires (UTP or optic fibre) More advanced encoding (FEC) 41

Ethernet MAC address ipconfig /all 42

Network addresses In a network, all stations need an address so that the data can reach the right destination. All computers connected to a standard LAN have a unique physical address. 43

Unicast and broadcast addresses Data transfer usually peformed in unicast One source and one destination Some messages sent in broadcast One source to all hosts in the network In 802-networks, the broadcast address is defined as all 1:s. 44

Wireless LAN Popularity of Internet Popularity of mobility Basically: A change in medium Media access technology becomes important 45

Hidden terminal problem Infamous in wireless networks Prevents collision detection 46

CSMA with Collision Avoidance (CSMA/CA) Invented for wireless Interframe space Contention window RTS/CTS/ACK 47

Interframe space Do not send immediately when medium idle Wait a period of time (interframe space, IFS) A distant station may have already started transmitting If, after IFS time, channel still idle, send 48

Contention window Amount of time divided into slots Pick a random number of slots as waiting time During waiting time, if channel becomes busy, defer transmission and restart timer when channel idle again 49

RTS/CTS/ACK Solution to hidden terminal problem Time-out 50

IEEE 802.11 project IEEE WLAN standard 51

Summary: Data Link Layer (2) Medium Access Control Sublayer Access methods Slotted ALOHA, CSMA/CD Ethernet Evolution of local area networks Wireless LAN Hidden terminal problem CSMA/CA 52