Lecture 6: Example LAN: Ethernet

Similar documents
Data Link Layer -2- Network Access

Data Link Layer -2- Network Access

CARRIER SENSE MULTIPLE ACCESS (CSMA):

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Data Link Layer, Part 3 Medium Access Control. Preface

Contention Protocols and Networks

Zarządzanie sieciami telekomunikacyjnymi

Data Link Layer, Part 5. Medium Access Control

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Lecture 05 Chapter 16 High Speed LANs

Chapter 4. The Medium Access Control Sublayer

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Data and Computer Communications

Part3. Local Area Networks (LAN)

LAN PROTOCOLS. Beulah A AP/CSE

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Lecture 8: Switched Ethernet and Collision Domains

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Chapter 8 LAN Topologies

Local Area Networks (LANs) SMU CSE 5344 /

COS 140: Foundations of Computer Science

Direct Link Networks (II)

Ethernet. Computer Networks. Lecture 4.

Link Layer and Ethernet

ECE 158A: Lecture 13. Fall 2015

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

CSE 461: Multiple Access Networks. This Lecture

CSMA/CD (Collision Detection)

Networking Technologies and Applications

Ethernet. Introduction. CSE 3213 Fall 2011

LAN, MAN and WAN. Basics and Comparison. University of Damascus. Computer Engineering Dept. Digital Communications. By Abdulrahman Idlbi

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L5 Data link (part 2)

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Link Layer and Ethernet

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Computer Networks. Medium Access Sublayer (Part I)

Lecture 4b. Local Area Networks and Bridges

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Reminder: Datalink Functions Computer Networking. Datalink Architectures

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

EE 122: Ethernet and

TYPES OF COMPUTER NETWORKS

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

COS 140: Foundations of Computer Science

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

ECE 4450:427/527 - Computer Networks Spring 2017

Data Link Layer: Collisions

The Medium Access Control Sublayer

Direct Link Communication II: Wired Media. Multi-Access Communication

Summary of MAC protocols

Redes de Computadores. Medium Access Control

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

ECE 4450:427/527 - Computer Networks Spring 2017

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Lecture (04) Data link layer

Access Technologies! Fabio Martignon

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Multiple Access. Data Communications and Networking

Multiple Access Protocols

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Campus Network Design

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

Data and Computer Communications. Chapter 11 Local Area Network

ก ก Information Technology II

Introduction to LAN Protocols

Introduction to LAN Protocols

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

CSE/EE 461 Wireless and Contention-Free Protocols

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Dr./ Ahmed Mohamed Rabie Sayed

10- and 100-Mbps Ethernet

Medium Access Protocols

Chapter 12 Multiple Access 12.1

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Unit II. Part A (2 Marks)

The Internet software layers

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Ethernet. Networks: Ethernet 1

Chapter 4 NETWORK HARDWARE

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

Transcription:

Lecture 6: Example LAN: Ethernet Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Network Types Local Area Networks (LANs):privately-owned networks within a single building or campus of up to few kilometers in size: Ethernet, IBM Token Ring, FDDI and IEEE 802.11 Wi-Fi. Metropolitan Area Networks (MANs): spans a city or part of a city: IEEE 802.16 WiMAX. Wide Area Networks (WANs): spans a large geographical area, often a country or continent: ATM and Frame Relay. Personal Area Networks (PANs): spans a single room and connects personal devices: Bluetooth, NFC and UWB. 2 1

LAN Network Topologies: Star vs. Bus vs. Ring Each LAN utilizes a single high-bandwidth shared medium (e.g., a cable), to which many computers are attached (reduces cost). Different computers take turns (coordinate) among each other to send frames on the shared medium. Handled by MAC (Medium Access Control) sublayer. 3 LANs: Ethernet & ALOHA Ethernet was inspired by the ALOHA protocol, which was the first LAN created. ALOHA, built at the University of Hawaii in early 1970s, ran at 9.6 kbps data rate and used a shared wireless medium. ALOHA allowed remote terminals at distant locations (different islands) to access a main computer in a central location. Ethernet was a variation of the ALOHA protocol, and inherited many of its features, but then evolved significantly over the years to support higher data rates and longer distances. 4 2

Ethernet Ethernet is a widely used LAN technology. It is also being expanded into MAN and WAN. Invented at Xerox Palo Alto Research Center in late 1970s. Operated at a rate of 10 Mbps and was called DIX Ethernet (DEC, Intel and Xerox). IEEE now maintains the Ethernet standard, known as IEEE 802.3 (standardized in 1983). In its original 10 Mbps version, Ethernet used a single coaxial cable, called the ether, to which multiple computers connect through taps. Later versions of the 10 Mbps Ethernet used UTP cables with hubs and switches. A very popular version of Ethernet is Fast Ethernet, operating at 100 Mbps, and uses UTP with switches. 5 Ethernet [2] Next version, getting more popular by the day, is Gigabit Ethernet (GigE or GbE) operating at 1 Gbps(1000 Mbps). The next, also popular but in Ethernet core switches, is 10 Gigabit Ethernet (10GigE or 10GbE) operating at 10 Gbps. The high data rate systems use hi-end switches with mostly optical fiber (but sometimes UTP as well). The 10GbE was finalized in 2002. The IEEE 802.3bm standard, released in 2015, defines 100G/40G Ethernet for optical fiber. The IEEE 802.3bsstandard (December 2017) introduces 200GbE (200 Gbit/s) over single-mode fiber and 400GbE (400 Gbit/s) over optical physical media. IEEE 802.3av defines 10G-EPON (passive optical network). Ethernet Over SDH (EoSor EoSDH) &Ethernet over SONET. 6 3

Ethernet: IEEE 802.3 Standard 7 Ethernet MAC: CSMA/CD Ethernet MAC protocol is known as Carrier Sense Multiple Access with Collision Detection (CSMA/CD). CSMA/CD coordinate access among different users to the shared bus. It is very similar to ALOHA but with improvements. If a station wants to send a frame, it first listens to the channel, called carrier sense or listen-before-talk (LBT). Carrier sense avoids interrupting an ongoing transmission. If the station senses a busy channel, it waits for the cable to become idle again then sends its frame after an interframegap time (9.6 µs). If two stations sense an idle channel and start transmitting at the same time, the two signals will interfere with each other: called collision or contention. While a stationis transmitting, it monitors the current flowing through the channel. If the current is higher than normal, then it detects a collision: collision detect. 8 4

9 Start Do we have a frame to transmit? No Yes No Listen/ Channel Idle? Yes Start transmission (maintain a minimum of interframe gap time with previous frame) 1-persistent not, p-persistent not, non-persistent Stop transmitting the frame / Send a jamming signal No Listen/ Collision Detected? No Transmission Done? Yes Calculate delay from contention resolution algorithm (CRA) Wait... Yes End 10 5

Binary exponential backoff algorithm If a frame has collided n successive times (where n< 16) then the sending station must choose a random number Kwith equal probabilities from the set {0, 1, 2, 3,, 2 m 1}, where m= min (n, 10) The station must wait for Kx 512 bit times(at 10 Mbps, one bit time = 10-7 seconds) before starting another transmission attempt. Give up transmission attempt of the frame if it encounters 16 successive collisions, or reset counters (i.e., set n= 0) if the frame is successfully transmitted. 11 Maximum Collision Detection Time Maximum end-to-end propagation delay in the cable τis: τ= maximum end-to-end distance (m) / propagation speed in coax (m/s) = 2500 / 2.3 10 8 = 10.9 10-6 s. At 10 Mbps, one bit time = 10-7 seconds, which means τ= 109 bit times. To allow for some delay in the repeaters, the specifications of Ethernet allow for a maximum end-to-end propagation time of τ= 225 bit times. 12 6

13 Persistance 1-persistent:If the transmitting node senses an idle channel, it immediately starts transmitting its frame. If the channel is sensed busy, the node continues listening until the channel is idle again, then starts transmitting its frame after a small interframegap. p-persistent: If the transmitting node senses an idle channel, it starts transmitting its frame with probability p (i.e., it might not transmit with probability 1-p). If the channel is sensed busy, the node continues listening until the channel is idle again, then starts transmitting with probability p. If the node decides not to transmit (with probability 1- p), it defers transmission by one time slot (which is typically τ), and at the start of the next time slot, 14 7

Persistance (Cont.), the nodes checks the channel again and transmits with probability p if the channel is idle (or defers again with probability 1-p). This process is repeated until either the frame is transmitted or the channel becomes busy again. When the channel becomes busy, the station acts as though there had been a collision and waits for a random amount of time before the next attempt. non-persistent: If the transmitting node senses an idle channel, it starts transmitting its frame immediately. If the channel is sensed busy, the node does not continue listening until the channel is idle again; rather it waits a random amount of time and re-senses the channel again after that delay. 15 Performance Parameters vs. Load Throughput (S): average rate of successful frame delivery. Calculated as the number of successful bits sent in a period of time divided by that time period (bit/s). Delay (D):the time period the frame needs to successfully reach the destination. Usually average delay is calculated. Utilization (U): proportion of the channel time which is used by the traffic which arrives at it. Frame drop probability (P): proportion of total frames sent by the source that are not received by the destination. 16 8

17 Throughput 18 9