EITF25 Internet- - Techniques and Applica8ons Stefan Höst. L5 Data link (part 2)

Similar documents
Data Link Layer -2- Network Access

Data Link Layer -2- Network Access

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Data Link Layer: Collisions

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Chapter 12 Multiple Access 12.1

Multiple Access. Data Communications and Networking

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

COS 140: Foundations of Computer Science

Ethernet. Introduction. CSE 3213 Fall 2011

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

COS 140: Foundations of Computer Science

Lecture 6: Example LAN: Ethernet

Hamming Code. Gives a method for construc=ng a code with a distance of 3. Plus an easy way to correct [soon]

CSMA/CD (Collision Detection)

Multiple Access Protocols

LAN PROTOCOLS. Beulah A AP/CSE

Data and Computer Communications

The Medium Access Control Sublayer

COMMUNICATION NETWORKS NETW 501

Chapter 4. The Medium Access Control Sublayer

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Contention Protocols and Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

ECE 4450:427/527 - Computer Networks Spring 2017

Data Link Layer Technologies

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Link Layer and Ethernet

Unit 7 Media Access Control (MAC)

Link Layer and Ethernet

Redes de Computadores. Medium Access Control

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

ECE 158A: Lecture 13. Fall 2015

Medium Access Control Sublayer Chapter 4

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

CSE 461: Multiple Access Networks. This Lecture

Access Technologies! Fabio Martignon

Link Layer. w/ credit to Rick Graziani (Cabrillo) for some of the anima<ons

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

EE 122: Ethernet and

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Link Layer. w/ much credit to Cisco CCNA and Rick Graziani (Cabrillo)

Local Area Networks (LANs) SMU CSE 5344 /

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Chapter 5 Link Layer and LANs

CMPE 257: Wireless and Mobile Networking

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Module 5 Local Area Networks

MULTIPLE ACCESS PROTOCOLS 2. 1

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CARRIER SENSE MULTIPLE ACCESS (CSMA):

ECEN 5032 Data Networks Medium Access Control Sublayer

Introduc)on to Wireless Networks. Dino Lopez

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Multiple Access Links and Protocols

Medium Access Control

Data Link Layer, Part 3 Medium Access Control. Preface

Protocols for Multiaccess Networks

CMPE 257: Wireless and Mobile Networking

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Aloha and slotted aloha

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

Media Access Control. Networked Systems (H) Lecture 5

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Data and Computer Communications. Chapter 11 Local Area Network

Data Link Layer, Part 5. Medium Access Control

Networking Technologies and Applications

Lecture 05 Chapter 16 High Speed LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs

Wireless Communications

CSE/EE 461 Wireless and Contention-Free Protocols

Local Networks. Lecture 4 6-Apr-2016

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Medium Access Control Sublayer Chapter 4

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Introduction to LAN Protocols

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Link Layer: Retransmissions

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Medium Access Control

Computer Networks Principles LAN - Ethernet

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

COMP/ELEC 429/556 Introduction to Computer Networks

Multiple-access protocols

The MAC layer in wireless networks

Transcription:

EITF25 Internet- - Techniques and Applica8ons Stefan Höst L5 Data link (part 2)

Local Area Networks (LAN) Typically limited in size Tradi8onally shared- medium Designed for private areas Offices Campuses Homes 2

Conven8onal LAN topologies Mesh Bus Star Ring 3

Concept of shared medium Not for wired media any longer Wireless LAN (WLAN) share wireless medium. 4

Shared medium characteris8cs Broadcast All data reaches all sta8ons AUenua8on The network has a limited size. Extending the link Repeaters amplify signal on link 5

Data transfer on a shared medium Packet to C A B C D The computer with the right des8na8on address copies the packet and delivers it to the applica8on. 6

Medium Access Control (MAC) Set of rules for sending (and receiving) data in a mul8ple access network 7

Controlled access protocols Sta8ons consult one another to find which sta8on has the right to send. A sta8on cannot send unless it has been authorized by other sta8ons. Used in different parts of the mobile networks. 8

Controlled access: Reserva8on Time is divided into intervals. A reserva8on frame precedes the data frames. Sta8ons need to make a reserva8on before sending data. 9

Controlled access: Polling One Primary Sta8on (Master) Others are Secondary Sta8ons (Slaves) Master controls the link. Slaves follow instruc8ons. All data exchange is through the master. 10

Poll and Select func8ons If the primary sta8on has anything to send, it uses a Select func8on. If it wants to receive data it uses a Poll func8on. 11

Controlled access: Token Passing Sta8ons organized in a logical ring Token A special packet circula8ng through the ring Only a sta8on holding the token can use the link. A sta8on can only possess the token for a certain 8me, then it must release and pass the token on. 12

Random access protocols No sta8on superior to another No sta8on in control of another A sta8on with data to send uses a procedure to decide whether or not to send 13

Hawaii 14

Random access: ALOHA Mul8ple- access method of ALOHANET One of the first WLAN in the world Devloped by the University of Hawaii (1970) Mainframe (Oahu) ALOHANET 15

Pure ALOHA Sta8ons share one frequency band Mainframe sends data on another frequency (broadcast channel) A sta8on sends a frame whenever it has a frame to send. If the sta8on receives an ACK from the mainframe on the broadcast channel, the transmission is successful. If not, the frame needs to be retransmiued. 16

Pure ALOHA: Frames 17

Pure ALOHA: Resend strategy Aeer a collision Wait a random 8me and resend (backoff 8me T B ) Aeer K max auempts give up and try later (abort) Example: In binary exponen8al backoff the backoff 8me T B is T B U 0, 2 k 1 T f where k is the auempt number. 18

Pure ALOHA: Collisions 19

SloUed ALOHA Time divided into slots Each slot contains one frame in 8me A sta8on can only send at the beginning of a slot. 20

SloUed ALOHA: Frames 21

SloUed ALOHA: Colllisions 22

Throughput For Aloha the maximum u8liza8on of the shared medium is SloUed Aloha: 36.8% Pure Aloha: 18.4% 23

Carrier Sense Mul8ple Access (CSMA) Listen to (sense) medium before sending If medium occupied (busy), wait 1- persistent Non- persistent P- persistent 24

Persistence methods Keep sensing and send as soon as channel idle Wait random, sense again, send if idle Transmit with probability p, sense with 1- p, wait if busy 25

CSMA: Vulnerable 8me Propaga8on 8me CSMA has no collision procedure 26

CSMA/CD: Collision detec8on Monitors medium aeer sending a frame Abort transmission and send a jamming signal if collision detected 27

CSMA/CD: Minimum frame size Sending sta8on must be able to detect a collision before transmijng the frame s last bit Frame transmission 8me must be at least two 8mes maximum propaga8on 8me Colliding signal can propagate to sending sta8on before the last bit is transmiued. 28

IEEE s LAN standards (Project 802) 29

IEEE 802.3: Ethernet Created 1976 by Xerox, from 1983 in IEEE Evolved through new versions 10 Mbps (Standard ethernet) 100 Mbps (Fast ethernet) 1 Gbps (Gibabit ethernet) 10 Gbps (10- Gigabit ethernet) 100 Gbps (100- Gigabit ethernet) Access/home networks Backbone networks (400 Gbps expected in 2017) 30

Ethernet frame structure 31

Standard Ethernet implementa8ons 32

Evolu8on of Ethernet Collision domains 33

Switched Ethernet 34

Full- duplex switched Ethernet 35

Ethernet MAC address ipconfig /all (Windows) ifconfig (Unix) 36

Network addresses In a network, all sta8ons need an address so that the data can reach the right des8na8on. All computers connected to a standard LAN have a unique physical address. 37

Unicast and broadcast addresses Data transfer usually peformed in unicast One source and one des8na8on Some messages sent in broadcast One source to all hosts in the network In 802- networks, the broadcast address is defined as all 1:s. 38

Wireless LAN Popularity of Internet Popularity of mobility Basically: A change in medium Media access technology becomes important 39

Hidden terminal problem Infamous in wireless networks Prevents collision detec8on 40

CSMA with Collision Avoidance (CSMA/CA) Invented for wireless Interframe space Conten8on window RTS/CTS/ACK 41

Interframe space Do not send immediately when medium idle Wait a period of 8me (interframe space, IFS) A distant sta8on may have already started transmijng If, aeer IFS 8me, channel s8ll idle, send 42

Conten8on window Amount of 8me divided into slots Pick a random number of slots as wai8ng 8me During wai8ng 8me, if channel becomes busy, defer transmission and restart 8mer when channel idle again 43

RTS/CTS/ACK Solu8on to hidden terminal problem Time- out 44