Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

Similar documents
Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

ECE 4450:427/527 - Computer Networks Spring 2017

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

EE 122: Ethernet and

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Wireless and Mobile Networks 7-2

CSC 4900 Computer Networks: Wireless Networks

ECE 4450:427/527 - Computer Networks Spring 2017

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Computer and Network Security

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Ethernet and WiFi. h-p://xkcd.com/466/

Chapter 6 Wireless and Mobile Networks

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

128 CHAPTER 2 Getting connected 2.7 WIRELESS

Mohammad Hossein Manshaei 1393

Medium Access Control

Reliable Transmission

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network.

CMPE 344 Computer Networks Spring Getting Connected. Reading: Peterson and Davie, 2.1,

CS 332 Computer Networks Wireless Networks

Last Lecture: Data Link Layer

Mobile and Sensor Systems

Wireless Networks. Wireless Links. Mike Freedman hap:// Interference / bit errors

MULTIPLE ACCESS PROTOCOLS 2. 1

Data Link Layer, Part 3 Medium Access Control. Preface

CMPE 344 Computer Networks Spring Getting Connected. Reading: Peterson and Davie, 2.1,

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

CSE 461: Multiple Access Networks. This Lecture

Medium Access Control Sublayer Chapter 4

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks. Medium Access Sublayer (Part I)

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Elements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

LAN PROTOCOLS. Beulah A AP/CSE

Elements of a wireless network. Elements of a wireless network. Characteristics of selected wireless link standards. Elements of a wireless network

Data Link Layer, Part 5. Medium Access Control

Protocols for Multiaccess Networks

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Chapter 10: Wireless LAN & VLANs

Summary of MAC protocols

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross ( 6th ed.); , Kurose and Ross (7th ed.

Home Area Networks. Outline

COMP 3331/9331: Computer Networks and Applications

Wireless Local Area Networks. Networks: Wireless LANs 1

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CPSC 826 Internetworking. Wireless and Mobile Networks. Wireless Networks Wireless Hosts

COMP 3331/9331: Computer Networks and Applications

Link Layer. (continued)

Wireless networks. Wireless Network Taxonomy

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

CMPE 257: Wireless and Mobile Networking

MSIT 413: Wireless Technologies Week 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

ECE 158A: Lecture 13. Fall 2015

Networking Technologies and Applications

Copyright 2010, Elsevier Inc. All rights Reserved

Contention Protocols and Networks

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

COMP/ELEC 429/556 Introduction to Computer Networks

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Wireless and Mobile Networks

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Link Layer: Retransmissions

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Spring Ethernet

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Multiple Access in Cellular and Systems

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Outline / Wireless Networks and Applications Lecture 9: Wireless LANs Aloha and 802 Wireless. Regular Ethernet CSMA/CD

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Reminder: Datalink Functions Computer Networking. Datalink Architectures

The Link Layer and LANs. Chapter 6: Link layer and LANs

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Introduction to Computer Networks. IEEE Ethernet

Ethernet. Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff

Medium Access Protocols

CSCI-1680 Wireless Chen Avin

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Module 6: Wireless Mobile Networks

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

IEEE Technical Tutorial. Introduction. IEEE Architecture

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon

M06:Wireless and Mobile Networks. Corinna Schmitt

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Link Layer I: ALOHA, Time-, Frequency-, and Code Division. COS 463: Wireless Networks Lecture 4 Kyle Jamieson

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Transcription:

Lecture 6 Ethernet Reminder: Homework 2, Programming Project 2 due on 9/20/12. Thick-net Thin-net Twisted Pair Thursday, September 13 CS 475 Networks - Lecture 6 1 Thursday, September 13 CS 475 Networks - Lecture 6 5 Outline Ethernet - Physical Properties Chapter 2 - Getting Connected 2.1 Perspectives on Connecting 2.2 Encoding 2.3 Framing 2.4 Error Detection 2.5 Reliable Transmission 2.6 Ethernet 2.7 2.8 Summary Thursday, September 13 CS 475 Networks - Lecture 6 2 Multiple thick-net segments could be joined together with (no more than 4) repeaters for a total reach of 2500 m. Fig. 2.23 Ethernet repeater Thin-net segments could be joined similarly. Thursday, September 13 CS 475 Networks - Lecture 6 6 Ethernet Ethernet - Physical Properties Ethernet is the overwhelmingly most successful local area networking technology. Ethernet is a working example of carrier sense, multiple access with collision detection (CSMA/CD) technology. Ethernet was developed by Xerox and is based on the Aloha packet-radio network once used at the University of Hawaii. Ethernet was standardized as IEEE 802.3 Thursday, September 13 CS 475 Networks - Lecture 6 3 Fig. 2.24 Ethernet hub With 10/100BaseT a hub (multiway repeater) is used to connect hosts and segments. All hosts on segments connected by hubs or repeaters are in the same collision domain. Thursday, September 13 CS 475 Networks - Lecture 6 7

Frame Format An Ethernet frame has a 64 bit preamble of alternating 0s and 1s that are used for synch. Ethernet (MAC) addresses are 48 bits. Each adaptor has a unique address. The type field is used for demuxing higher protocols. Each frame contains at least 46 bytes of data (64 total) and no more than 1500 bytes. A 32 bit CRC is included in each frame. Thursday, September 13 CS 475 Networks - Lecture 6 8 In the worst case, A and B are widely separated and B starts transmitting just as A's frame reaches B. A's frame must be at least 2 x 2500 m / 3 x 10 8 m/s = 16.67 µs long in order to detect the collision. Ethernet specifies a min. length of 51.2 µs (512 bits or 64 bytes at 10 Mbps.) Fig. 2.26 Worst-case collision scenario Thursday, September 13 CS 475 Networks - Lecture 6 11 Addresses Addresses are 48 bits (6 bytes). They are typically printed in hex with colons separating the bytes (8:0:2b:e4:b1:2). Manufacturers have their own prefix to ensure that each adaptor has a unique address. A frame with a destination address of all 1s is a broadcast frame. A destination address with a leading 1 (but not a broadcast address) is a multicast frame. Thursday, September 13 CS 475 Networks - Lecture 6 9 Once a collision has been detected the adaptor waits before transmitting the frame again. Exponential backoff is used. It firsts waits either (randomly) 0 or 51.2 µs. If there is another collision it waits either 0, 51.2, 102.4 or 153.6 µs and so on. In general, a k value is randomly selected between 0 and 2 n 1 (n is the number of collisions). The adaptor waits k x 51.2 µs. Adaptors usually give up after 16 tries and report an error to the host. Thursday, September 13 CS 475 Networks - Lecture 6 12 When an adaptor has a frame to send and it senses that the line is idle, it transmits the frame immediately. If the line is busy, it waits for the line to go idle and then transmits the frame. Due to propagation delays, collisions can occur. When an adaptor detects that a frame it sent has collided with another frame it stops transmitting and immediately transmits a 32 bit jamming sequence. Experience with Ethernet Multi-access Ethernet has been used primarily in situations where there are fewer than 200 hosts and distances in the 100s of meters, since collisions waste network capacity. E.g. in a room to a hub connected to switch in a wiring closet. Thursday, September 13 CS 475 Networks - Lecture 6 10 Thursday, September 13 CS 475 Networks - Lecture 6 13

Experience with Ethernet Ethernet characteristics that made it successful Original Ethernet easy to administer and maintain - no switches, no configuration tables, just add a tap to the network wire. Inexpensive - coaxial cable is cheap, one network adapter per host. Switched networks needed to similar. Resulted in switched Ethernet. Most Ethernet links are now point-to-point between hubs, switches, and routers. Thursday, September 13 CS 475 Networks - Lecture 6 14 Most common wireless links are asymmetric. One node (the base station) is not mobile and has a wired (or high BW) connection to another network. Fig 2.28 network with base station Even though radio waves transmitted by one client may be received by another, all node-tonode comm. is routed through the base station. Thursday, September 13 CS 475 Networks - Lecture 6 17 networks share some common characteristics with wired networks Bit errors are of great concern Media is inherently multi-access networks differ from wired networks in several ways Low power, especially small mobile devices Limits on transmission power and frequency, uses spread spectrum to minimize interference from other devices Thursday, September 13 CS 475 Networks - Lecture 6 15 The base station topology is associated with three levels of mobility: (1) no mobility (Point2Point), (2) mobility within the range of a base (Bluetooth), and (3) mobility between bases (Wi-Fi, cell phones). An alternative topology is the mesh or ad hoc network in which there is no base station. All nodes are peers and communicate with neighbors. Messages may be forwarded along a chain of peer nodes. Thursday, September 13 CS 475 Networks - Lecture 6 18 Table 2.4 Overview of Leading Technologies Typical link length Typical data rate Typical use Wired analogy Bluetooth 802.15.1 WiFi 802.11 3G Cellular 10 m 100 m Tens of km 2.1 Mbps (shared) Peripherals to computer (PAN) 54 Mbps (shared) Laptop to wired network USB Ethernet DSL 384+ kbps (per conn.) Mobile device to wired tower Fig 2.29 A wireless mesh or ad hoc network Thursday, September 13 CS 475 Networks - Lecture 6 16 Thursday, September 13 CS 475 Networks - Lecture 6 19

802.11 / Wi-Fi Physical Properties 802.11 / Wi-Fi - Scanning Wi-Fi runs over six different physical layer protocols. The original 802.11 defined spread spectrum and direct sequence channels at 2 Mbps. 802.11b defined a new channel operating at 11 Mbps. All operated at 2.4 GHz. 802.11a delivers up to 54 Mbps and operates at 5 GHz. 802.11g went back to 2.4 GHz and delivers up to 54 Mbps. Most commercial products support 802.11a, 802.11b, and 802.11g to ensure compatibility with all WiFi devices.c To enable initial connection and mobility between access points (APs): 1) A node sends a Probe. 2) All APs within range send a Probe Response. 3) The node sends an Assoc. Request to one AP 4) The AP responds with an Assoc. Response frame Fig. 2.32/2.33 Node Mobility Thursday, September 13 CS 475 Networks - Lecture 6 20 Thursday, September 13 CS 475 Networks - Lecture 6 23 Frequency Hoping VS Direct Sequence 802.11 / Wi-Fi - Frame Format Frequency Hoping uses spread Spectrum Spread Signal Over wider frequency band to avoid interference. Pseudorandom number generated hops Direct Sequence Send Redundant bits XOR's bits with Pseudorandom bits Figure 2.27 A WiFi frame can carry up to 2,312 data bytes. The Control field indicates if the frame is an RTS or CTS and also contains the ToDS and FromDS bits. If two nodes are directly comm. both DS bits are 0, Addr1 ids the destination and Addr2 the source. In the more complex case where two nodes use two different APs, both bits are 1 and the AP addresses are included in the frame. Thursday, September 13 CS 475 Networks - Lecture 6 21 Thursday, September 13 CS 475 Networks - Lecture 6 24 802.11 / Wi-Fi - Collision Avoidance Bluetooth (802.15.1) Due to hidden nodes collision avoidance is used instead of collision detection. The sender sends a Request to Send (RTS) packet waiting for a Clear to Send (CTS) from the receiver. Any adjacent nodes that see the CTS do not transmit. Fig. 2.30/2.31 Hidden and Exposed Nodes Thursday, September 13 CS 475 Networks - Lecture 6 22 Bluetooth operates in the license exempt band of 2.45 GHz. It offers speeds up to 2.1 Mbps and low power consumption. It has a short range of only 10 m. A Bluetooth piconet consists of a master device and up to seven active slave devices (up to 255 devices can be inactive or parked). All comm. is through the master. Bluetooth uses spread spectrum across 79 channels to prevent interference with other devices operating at 2.45 GHz. Thursday, September 13 CS 475 Networks - Lecture 6 25

Bluetooth (802.15.1) Fig 2.35 A Bluetooth piconet Thursday, September 13 CS 475 Networks - Lecture 6 26 Cell Phone Technologies The area served by a cell phone base station is known as a cell. Cells overlap, but at any time a phone is communication with only one base. As the phone moves a handoff may be used to transfer the phone to a new base. There are several competing cell phone technologies. 2G (and higher) technologies are digital and optimized for voice. 3G and 4G have higher BW and simultaneous voice and data transmission. There are several (incompatible) technologies. Thursday, September 13 CS 475 Networks - Lecture 6 27 Summary Chapter 2 introduced the many and varied types of links, and looked at five key problems How to encode bits into a signal at a source node and recover the bits at the receiving node How to package bits into frames How to detect bit errors How to make a link appear reliable How to mediate access to a shared link so that all nodes eventually have a chance to transmit data Thursday, September 13 CS 475 Networks - Lecture 6 28