The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Similar documents
LAN PROTOCOLS. Beulah A AP/CSE

Multiple Access. Data Communications and Networking

Part3. Local Area Networks (LAN)

Data Link Layer, Part 3 Medium Access Control. Preface

IEEE 802 LANs SECTION C

Data Link Layer, Part 5. Medium Access Control

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Data and Computer Communications

Contention Protocols and Networks

ECE 4450:427/527 - Computer Networks Spring 2017

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Introduction to Computer Networks. IEEE Ethernet

Lecture 4b. Local Area Networks and Bridges

Summary of MAC protocols

Local Area Network Overview

EE 122: Ethernet and

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Computer Networks Principles LAN - Ethernet

M242 COMPUTER NETWORS AND SECURITY

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Internet Architecture and Protocol

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Data and Computer Communications. Chapter 11 Local Area Network

2. LAN Topologies Gilbert Ndjatou Page 1

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Ethernet. Networks: Ethernet 1

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Introduction to LAN Protocols

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

1: Review Of Semester Provide an overview of encapsulation.

Medium Access Protocols

IEEE STANDARDS In ,, the Computer Computer Society of of the IEEE IEEE started a p j ro ect,

Chapter 15 Local Area Network Overview

Unit II. Part A (2 Marks)

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a

Multiple Access Protocols

Wired LANs: Ethernet

Redes de Computadores. Medium Access Control

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Ethernet. Introduction. CSE 3213 Fall 2011

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ET4254 Communications and Networking 1

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

Data Link Layer -2- Network Access

Networking Technologies and Applications

Local Area Networks. Ethernet LAN

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Link Layer and Ethernet

Computer and Network Security

Data Link Layer -2- Network Access

Chapter 11 in Stallings 10 th Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Introduction to LAN Protocols

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

Access Technologies! Fabio Martignon

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

Lecture 05 Chapter 16 High Speed LANs

Link Layer and Ethernet

1. Data Link Layer Protocols

CSE 461: Multiple Access Networks. This Lecture

Media Access Control (MAC) Sub-layer and Ethernet

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Outline: Connecting Many Computers

1. Data Link Layer (Layer 2)

Data Link Layer: Collisions

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

Interface The exit interface a packet will take when destined for a specific network.

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

IEEE standards for local area networks

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Ethernet Standard. Campus Network Design. Ethernet address. OSI Model. Thana Hongsuwan

NT1210 Introduction to Networking. Unit 5:

Local Area Networks (LANs) SMU CSE 5344 /

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Principles behind data link layer services

Chapter 8 LAN Topologies

The MAC Layer. Contents. Textbook. Jean Yves Le Boudec Fall 2012

Introduction to Networks and the Internet

COS 140: Foundations of Computer Science

Chapter 16 Networking

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

Medium Access Control

Lecture (04 & 05) Data link layer fundamental

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Transcription:

Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of controlling the access to the medium is similar to the rules of speaking in an assembly. The procedures guarantee that the right to speak is upheld and ensure that two people do not speak at the same time, do not interrupt each other, do not monopolize the discussion, and so on. The situation is similar for multipoint networks. Many formal protocols have been devised to handle access to a shared link.we categorize them into three groups. Protocols belonging to each group are shown in Figure 12.2. RANDOM ACCESS In a random access method, each station has the right to the medium without being controlled by any other station. However, if more than one station tries to send, there is an access conflict-collision-and the frames will be either destroyed or modified. To avoid access conflict or to resolve it when it happens, each station follows a procedure that answers the following questions: 1- When can the station access the medium? 2- What can the station do if the medium is busy? 3- How can the station determine the success or failure of the transmission? 4- What can the station do if there is an access conflict? 1

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure called multiple access (MA). The method was improved with the addition of a procedure that forces the station to sense the medium before transmitting. This was called carrier sense multiple access. This method later evolved into two parallel methods: carrier sense multiple access with collision detection (CSMA/CD) and carrier sense multiple access with collision avoidance (CSMA/CA). CSMA/CD tells the station what to do when a collision is detected. CSMA/CA tries to avoid the collision. 2

It is obvious that we need to resend the frames that have been destroyed during transmission. The pure ALOHA protocol relies on acknowledgments from the receiver. When a station sends a frame, it expects the receiver to send an acknowledgment. If the acknowledgment does not arrive after a timeout period, the station assumes that the frame (or the acknowledgment) has been destroyed and resends the frame. A collision involves two or more stations. If all these stations try to resend their frames after the time-out, the frames will collide again. Pure ALOHA dictates that when the time-out period passes, each station waits a random amount of time before resending its frame. The randomness will help avoid more collisions. We call this time the back-off time TB. Pure ALOHA has a second method to prevent congesting the channel with retransmitted frames. After a maximum number of retransmission attempts K max' a station must give up and try later. 3

Figure 12.4 shows the procedure for pure ALOHA based on the above strategy. The time-out period is equal to the maximum possible round-trip propagation delay, which is twice the amount of time required to send a frame between the two most widely separated stations (2 x Tp)' The back-off time TB is a random value that normally depends on K (the number of attempted unsuccessful transmissions). The formula for TB depends on the implementation. One common formula is the binary exponential back-off. In this method, for each retransmission, a multiplier in the range 0 to 2K - 1 is randomly chosen and multiplied by Tp (maximum propagation time) or Tfr (the average time required to send out a frame) to find TB' Note that in this procedure, the range of the random numbers increases after each collision. The value of K max is usually chosen as 15. Example 12.1 The stations on a wireless ALOHA network are a maximum of 600 km apart. If we assume that signals propagate at 3 x 108 mis, we find Tp = (600 x 10^5) / (3 x 10^8) = 2 ms. Now we can find the value of TB for different values of K. a. For K = 1, the range is {O, I}. The station needs to generate a random number with a value of 0 or 1. This means that TB is either ms (0 x 2) or 2 ms (l x 2), based on the outcome of the random variable. 4

b. For K =2, the range is {O, 1, 2, 3}. This means that TB can be 0, 2, 4, or 6 ms, based on the outcome of the random variable. c. For K =3, the range is to, 1,2,3,4,5,6, 7}. This means that TB can be 0,2,4,..., 14 ms, based on the outcome of the random variable. d. We need to mention that if K > 10, it is normally set to 10. Carrier Sense Multiple Access (CSMA) To minimize the chance of collision and, therefore, increase the performance, the CSMA method was developed. The chance of collision can be reduced if a station senses the medium before trying to use it. Carrier sense multiple access (CSMA) requires that each station first listen to the medium (or check the state of the medium) before sending. In other words, CSMA is based on the principle "sense before transmit" or "listen before talk." 5

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) The CSMA method does not specify the procedure following a collision. Carrier sense multiple access with collision detection (CSMA/CD) augments the algorithm to handle the collision. 6

Example 12.5 A network using CSMA/CD has a bandwidth of 10 Mbps. If the maximum propagation time (including the delays in the devices and ignoring the time needed to send a jamming signal, as we see later) is 25.611S, what is the minimum size of the frame? Solution The frame transmission time is Tfr = 2 x Tp =51.2 ~s. This means, in the worst case, a station needs to transmit for a period of 51.2 ~s to detect the collision. The minimum size of the frame is 10 Mbps x 51.2!-ls =512 bits or 64 bytes. This is actually the minimum size of the frame for Standard Ethernet Procedure Now let us look at the flow diagram for CSMA/CD in Figure 12.14. It is similar to the one for the ALOHA protocol, but there are differences. The first difference is the addition of the persistence process. We need to sense the channel before we start sending the frame by using one of the persistence processes we discussed previously (I-persistent, or p-persistent). The corresponding box can be replaced by one of the persistence processes shown in Figure 12.11. The second difference is the frame transmission. In ALOHA, we first transmit the entire frame and then wait for an acknowledgment. In CSMA/CD, transmission and collision detection is a continuous process. We do not send the entire frame and then look for a collision. The station transmits and receives continuously and simultaneously (using two different ports). We use a loop to show that transmission is a continuous process. We constantly monitor in order to detect one of two conditions: either transmission is finished or a collision is detected. Either event stops transmission. When we come out of the loop, if a collision has not been detected, it means that transmission is complete; the entire frame is transmitted. Otherwise, a collision has occurred. The third difference is the sending of a short jamming signal that enforces the collision in case other stations have not yet sensed the collision. 7

8

9

Wired LANs: Ethernet In Chapter 1, we learned that a local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although a LAN can be used as an isolated network to connect computers in an organization for the sole purpose of sharing resources, most LANs today are also linked to a wide area network (WAN) or the Internet. The LAN market has seen several technologies such as Ethernet, Token Ring, Token Bus, FDDI, and ATM LAN. Some of these technologies survived for a while, but Ethernet is by far the dominant technology. IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety of manufacturers. Project 802 does not seek to replace any part of the OSI or the Internet model. Instead, it is a way of specifying functions of the physical layer and the data link layer of major LAN protocols. The standard was adopted by the American National Standards Institute (ANSI). In 1987, the International Organization for Standardization (ISO) also approved it as an international standard under the designation ISO 8802. The relationship of the 802 Standard to the traditional OSI model is shown in Figure 13.1. The IEEE has subdivided the data link layer into two sub layers: logical link control (LLC) and media access control (MAC). IEEE has also created several physical layer standards for different LAN protocols. 1

Data Link Layer As we mentioned before, the data link layer in the IEEE standard is divided into two sub layers: LLC and MAC. Logical Link Control (LLC) In Chapter II, we discussed data link control. We said that data link control handles framing, flow control, and error control. In IEEE Project 802, flow control, error control, and part of the framing duties are collected into one sub layer called the logical link control. Framing is handled in both the LLC sub layer and the MAC sub layer. The LLC provides one single data link control protocol for all IEEE LANs. In this way, the LLC is different from the media access control sub layer, which provides different protocols for different LANs. A single LLC protocol can provide interconnectivity between different LANs because it makes the MAC sub layer transparent. Figure 13.1 shows one single LLC protocol serving several MAC protocols. Framing LLC defines a protocol data unit (PDU) that is somewhat similar to that of HDLC. The header contains a control field like the one in HDLC; this field is used for flow and error control. The two other header fields define the upper-layer protocol at the source and destination that uses LLC. These fields are called the destination service access point (DSAP) and the source service access point (SSAP). The other fields defined in a typical data link control protocol such as HDLC are moved to the MAC sub layer. In other words, a frame defined in HDLC is divided into a PDU at the LLC sub layer and a frame at the MAC sub layer, as shown in Figure 13.2 Need for LLC The purpose of the LLC is to provide flow and error control for the upper-layer protocols that actually demand these services. For 2

example, if a LAN or several LANs are used in an isolated system, LLC may be needed to provide flow and error control for the application layer protocols. However, most upper-layer protocols such as IP (discussed in later Chapter), do not use the services of LLC. For this reason, we end our discussion of LLC. Media Access Control (MAC) In Chapter 12, we discussed multiple access methods including random access, controlled access, and canalization. IEEE Project 802 has created a sub layer called media access control that defines the specific access method for each LAN. For example, it defines CSMA/CD as the media access method for Ethernet LANs and the token passing method for Token Ring and Token Bus LANs. As we discussed in the previous section, part of the framing function is also handled by the MAC layer. In contrast to the LLC sub layer, the MAC sub layer contains a number of distinct modules; each defines the access method and the framing format specific to the corresponding LAN protocol. Physical Layer The physical layer is dependent on the implementation and type of physical media used. IEEE defines detailed specifications for each LAN implementation. For example, although there is only one MAC sub layer for Standard Ethernet, there is a different physical layer specification for each Ethernet implementations as we will see later. 3

STANDARD ETHERNET The original Ethernet was created in 1976 at Xerox's Palo Alto Research Center (PARC). Since then, it has gone through four generations: Standard Ethernet (lot Mbps), Fast Ethernet (100 Mbps), Gigabit Ethernet (l Gbps), and Ten-Gigabit Ethernet (l0 Gbps), as shown in Figure 13.3. We briefly discuss all these generations starting with the first, Standard (or traditional) Ethernet. MAC Sub layer In Standard Ethernet, the MAC sub layer governs the operation of the access method. It also frames data received from the upper layer and passes them to the physical layer. Frame Format The Ethernet frame contains seven fields: preamble, SFD, DA, SA, length or type of protocol data unit (PDU), upper-layer data, and the CRC. Ethernet does not provide any Mechanism for acknowledging received frames, making it what is known as an unreliable medium. Acknowledgments must be implemented at the higher layers. The format of the MAC frame is shown in Figure 13.4. 4

Preamble. The first field of the 802.3 frame contains 7 bytes (56bits) of alternating 0s and 1s that alerts the receiving system to the coming frame and enables it to synchronize its input timing. The pattern provides only an alert and a timing pulse. The 56-bit pattern allows the stations to miss some bits at the beginning of the frame. The preamble is actually added at the physical layer and is not (formally) part of the frame. Start frame delimiter (SFD). The second field (l byte: 10101011) signals the beginning of the frame. The SFD warns the station or stations that this is the last chance for synchronization. The last 2 bits is 11 and alerts the receiver that the next field is the destination address. Destination addresses (DA). The DA field is 6 bytes and contains the physical address of the destination station or stations to receive the packet. We will discuss addressing shortly. Source addresses (SA). The SA field is also 6 bytes and contains the physical address of the sender of the packet. We will discuss addressing shortly. Length or type. This field is defined as a type field or length field. The original Ethernet used this field as the type field to define the upper-layer protocol using the MAC frame. The IEEE standard used it as the length field to define the number of bytes in the data field. Both uses are common today. Data. This field carries data encapsulated from the upper-layer protocols. It is a minimum of 46 and a maximum of 1500 bytes, as we will see later. CRC. The last field contains error detection information, in this case a CRC-32. 5

The minimum length restriction is required for the correct operation of CSMA/CD as we will see shortly. An Ethernet frame needs to have a minimum length of 512 bits or 64 bytes. Part of this length is the header and the trailer. If we count 18 bytes of header and trailer (6 bytes of source address, 6 bytes of destination address, 2 bytes of length or type, and 4 bytes of CRC), then the minimum length of data from the upper layer is 64-18 = 46 bytes. If the upper-layer packet is less than 46 bytes, padding is added to make up the difference. The standard defines the maximum length of a frame (without preamble and SFD field) as 1518 bytes. If we subtract the 18 bytes of header and trailer, the maximum length of the payload is 1500 bytes. The maximum length restriction has two historical reasons. First, memory was very expensive when Ethernet was designed: a maximum length restriction helped to reduce the size of the buffer. Second, the maximum length restriction prevents one station from monopolizing the shared medium, blocking other stations that have data to send. Addressing Each station on an Ethernet network (such as a PC, workstation, or printer) has its own network interface card (NIC). The NIC fits inside the station and provides the station with a 6-byte physical address. As shown in Figure 13.6, the Ethernet address is 6 bytes (48 bits), nominally written in hexadecimal notation, with a colon between the bytes. Unicast, Multicast, and Broadcast Addresses A source address is always a unicast address-the frame comes from only one station. The destination address, however, can be unicast, multicast, or broadcast. Figure 13.7 shows how to distinguish a unicast address from a multicast address. If the least significant bit of the first byte in a destination address is 0, the address is unicast; otherwise, it is multicast. 6

The least significant bit of the first byte defines the type of address. If the bit is 0, the address is unicast; otherwise, it is multicast. A unicast destination address defines only one recipient; the relationship between the sender and the receiver is one-to-one. A multicast destination address defines a group of addresses; the relationship between the sender and the receivers is one-to-many. The broadcast address is a special case of the multicast address; the recipients are all the stations on the LAN. A broadcast destination address is forty-eight Is. The broadcast destination address is a special case of the multicast address in which all bits are Is. Example 13.1 Define the type of the following destination addresses: a. 4A:30:10:21:1O:1A b. 47:20:1B:2E:08:EE c. FF:FF:FF:FF:FF:FF Solution To find the type of the address, we need to look at the second hexadecimal digit from the left. If it is even, the address is unicast. If it is odd, the address is multicast. If all digits are F's, the address is broadcast. Therefore, we have the following: a. This is a unicast address because A in binary is 1010 (even). b. This is a multicast address because 7 in binary is 0111 (odd). c. This is a broadcast address because all digits are F's. The way the addresses are sent out on line is different from the way they are written in hexadecimal notation. The transmission is left-to-right, byte by byte; however, for each byte, the least significant bit is sent first and the most significant bit is sent last. This means that the bit that defines an address as unicast or multicast arrives first at the receiver. Example 13.2 Show how the address 47:20:1B:2E:08:EE is sent out on line. Solution The address is sent left-to-right, byte by byte; for each byte, it is sent right-to-left, bit by bit, as shown below: --- 11100010 00000100 11011000 01110100 00010000 01110111 7

Physical Layer Implantation The Standard Ethernet defines several physical layer implementations; four of the most common, are shown in Figure 13.8. Encoding and Decoding All standard implementations use digital signaling (base band) at 10 Mbps. At the sender, data are converted to a digital signal using the Manchester scheme; at the receiver The received signal is interpreted as Manchester and decoded into data. Manchester encoding is self-synchronous, providing a transition at each bit interval. Figure 13.9 shows the encoding scheme for Standard Ethernet. 10Base5: Thick Ethernet The first implementation is called 10Base5, thick Ethernet, or Thick net. The nickname derives from the size of the cable, which is roughly the size of a garden hose and too stiff to bend with your hands. 10BaseS was the first Ethernet specification to use a bus topology with an external transceiver (transmitter/receiver) connected via a tap to a thick coaxial cable. Figure 13.10 shows a schematic diagram of a l0base5 implementation. 1

The transceiver is responsible for transmitting, receiving, and detecting collisions. The transceiver is connected to the station via a transceiver cable that provides separate paths for sending and receiving. This means that collision can only happen in the coaxial cable. The maximum length of the coaxial cable must not exceed 500 m, otherwise, there is excessive degradation of the signal. If a length of more than 500 m is needed, up to five segments, each a maximum of Some-meter, can be connected using repeaters. 10Base2: Thin Ethernet The second implementation is called l0base2, thin Ethernet, or Cheaper net. I0Base2 also uses a bus topology, but the cable is much thinner and more flexible. The cable can be bent to pass very close to the stations. In this case, the transceiver is normally part of the network interface card (NIC), which is installed inside the station. Figure 13.11 shows the schematic diagram of a IOBase2 implementation. Note that the collision here occurs in the thin coaxial cable. This implementation is more cost effective than 10BaseS because thin coaxial cable is less expensive than thick coaxial and the tee connections are much cheaper than taps. Installation is simpler because the thin coaxial cable is very flexible. However, the length of each segment cannot exceed 185 m (close to 200 m) due to the high level of attenuation in thin coaxial cable. 2

10Base-T: Twisted-Pair Ethernet The third implementation is called 10Base-T or twisted-pair Ethernet. 10Base-T uses a physical star topology. The stations are connected to a hub via two pairs of twisted cable, as shown in Figure 13.12. Note that two pairs of twisted cable create two paths (one for sending and one for receiving) between the station and the hub. Any collision here happens in the hub. Compared to10base5 or lobase2, we can see that the hub actually replaces the coaxial Cable as far as a collision is concerned. The maximum length of the twisted cable here is defined as 100 m, to minimize the effect of attenuation in the twisted cable. 10Base-F: Fiber Ethernet Although there are several types of optical fiber l0-mbps Ethernet, the most common is called 10Base-F. 10Base-F uses a star topology to connect stations to a hub. The stations are connected to the hub using two fiber-optic cables, as shown in Figure 13.13. 3

13.3 CHANGES IN THE STANDARD The 10-Mbps Standard Ethernet has gone through several changes before moving to the higher data rates. These changes actually opened the road to the evolution of the Ethernet to become compatible with other high-data-rate LANs. We discuss some of these changes in this section. Bridged Ethernet The first step in the Ethernet evolution was the division of a LAN by bridges. Bridges have two effects on an Ethernet LAN: They raise the bandwidth and they separate collision domains. Raising the Bandwidth In an unabridged Ethernet network, the total capacity (10 Mbps) is shared among all stations with a frame to send; the stations share the bandwidth of the network. If only one station has frames to send, it benefits from the total capacity (10 Mbps). But if more than one station needs to use the network, the capacity is shared. For example, if two stations have a lot of frames to send, they probably alternate in usage. When one station is sending, the other one refrains from sending. We can say that, in this case, each station on average sends at a rate of 5 Mbps. Figure 13.14 shows the situation. The bridge, as we will learn in Chapter 15, can help here. A bridge divides the network into two or more networks. Bandwidth-wise, each network is independent. For example, in Figure 13.15, a network with 12 stations is divided into two networks, each with 6 stations. Now each network has a capacity of 10 Mbps. The l0-mbps capacity in each segment is now shared between 6 stations (actually 7 because the bridge acts as a station in each segment), not 12 stations. In a network with a heavy load, each station theoretically is offered 10/6 Mbps instead of 10/12 Mbps, assuming that the traffic is not going through the bridge. It is obvious that if we further divide the network, we can gain more bandwidth for each segment. For example, if we use a four-port bridge, each station is now offered 10/3 Mbps, which is 4 times more than an unabridged network. 4

Separating Collision Domains Another advantage of a bridge is the separation of the collision domain. Figure 13.16shows the collision domains for an unabridged and a bridged network. You can see that the collision domain becomes much smaller and the probability of collision is reduced tremendously. Without bridging, 12 stations contend for access to the medium; with bridging only 3 stations contend for access to the medium. Switched Ethernet The idea of a bridged LAN can be extended to a switched LAN. Instead of having two to four networks, why not have N networks, where N is the number of stations on the LAN? In other words, if we can have a multiple-port bridge, why not have an N-port switch? In this way, the bandwidth is shared only between the station and the switch (5 Mbps each). In addition, the collision domain is divided into N domains. A layer 2 switch is an N-port bridge with additional 5

sophistication that allows faster handling of the packets. Evolution from a bridged Ethernet to a switched Ethernet was a big step that opened the way to an even faster Ethernet, as we will see. Figure 13.17 shows a switched LAN. Full-Duplex Ethernet One of the limitations of 10Base5 and l0base2 is that communication is half-duplex (l0base-t is always full-duplex); a station can either send or receive, but may not do both at the same time. The next step in the evolution was to move from switched Ethernet to full-duplex switched Ethernet. The full-duplex mode increases the capacity of each domain from 10 to 20 Mbps. Figure 13.18 shows a switched Ethernet in full-duplex mode. Note that instead of using one link between the station and the switch, the configuration uses two links: one to transmit and one to receive. No Need for CSMA/CD In full-duplex switched Ethernet, there is no need for the CSMA/CD method. In a full duplex switched Ethernet, each station is connected to the switch via two separate links. Each station or switch can send and receive independently without worrying about collision. Each link is a point-to-point dedicated path between the station and the switch. There is no longer a need for carrier sensing; there is no longer a need for collision detection. The job of the MAC layer becomes much easier. The carrier sensing and collision detection functionalities of the MAC sub layer can be turned off. 6

MAC Control Layer Standard Ethernet was designed as a connectionless protocol at the MAC sub layer. There is no explicit flow control or error control to inform the sender that the frame has arrived at the destination without error. When the receiver receives the frame, it does not send any positive or negative acknowledgment. To provide for flow and error control in full-duplex switched Ethernet, a new sub layer, called the MAC control, is added between the LLC sub layer and the MAC sub layer. 7