Data Link Layer, Part 5. Medium Access Control

Similar documents
Data Link Layer, Part 3 Medium Access Control. Preface

LAN PROTOCOLS. Beulah A AP/CSE

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

EE 122: Ethernet and

Contention Protocols and Networks

Ethernet. Introduction. CSE 3213 Fall 2011

Media Access Control (MAC) Sub-layer and Ethernet

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CSE 461: Multiple Access Networks. This Lecture

Data and Computer Communications

Summary of MAC protocols

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data and Computer Communications. Chapter 11 Local Area Network

CSMA/CD (Collision Detection)

Protocols for Multiaccess Networks

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Link Layer and Ethernet

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 05 Chapter 16 High Speed LANs

Lecture 4b. Local Area Networks and Bridges

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Link Layer and Ethernet

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer II: Ethernet

Medium Access Protocols

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

EECS 122, Lecture 7. Kevin Fall Jean Walrand

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Networking Technologies and Applications

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Local Area Networks (LANs) SMU CSE 5344 /

Redes de Computadores. Medium Access Control

COS 140: Foundations of Computer Science

Data Link Layer -2- Network Access

Internet Architecture and Protocol

Computer Networks. Medium Access Sublayer (Part I)

Outline: Connecting Many Computers

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

Network Topology. By Dr. Piya Techateerawat. Bus Topology Ring Topology Star Topology Fully Connected Topology. Combined Topology

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6: Example LAN: Ethernet

COMP/ELEC 429/556 Introduction to Computer Networks

Data Link Layer -2- Network Access

Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...

ECEN 5032 Data Networks Medium Access Control Sublayer

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

COS 140: Foundations of Computer Science

Part3. Local Area Networks (LAN)

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

CS 455/555 Intro to Networks and Communications. Link Layer

Multiple Access Protocols

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Introduction to Networks and the Internet

Introduction to Computer Networks. IEEE Ethernet

CSE/EE 461 Wireless and Contention-Free Protocols

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

ECE 4450:427/527 - Computer Networks Spring 2017

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Local Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7.

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Chapter 6 Medium Access Control Protocols and Local Area Networks

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Computer Networks and Distributed Systems

Chapter 8 LAN Topologies

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Networks Homework # 2

Communication (III) Kai Huang

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Introduction to LAN Protocols

Access Technologies! Fabio Martignon

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

COMMUNICATION NETWORKS NETW 501

Direct Link Communication II: Wired Media. Multi-Access Communication

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Ethernet. Networks: Ethernet 1

Unit II. Part A (2 Marks)

Chapter 5: DataLink Layer

ECE 4450:427/527 - Computer Networks Spring 2017

Computer and Network Security

6th Slide Set Computer Networks

Chapter 5 Link Layer and LANs

Introduction to LAN Protocols

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Transcription:

CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU can make a single machine-readable copy and print a single copy of each slide for their own reference, so long as each slide contains the copyright statement, and GMU facilities are not used to produce paper copies. Permission for any other use, either in machine-readable or printed form, must be obtained from the author in writing. CS 455 Medium Access Control, Page 2 Preface In our earlier discussion about DLL, we assumed that a link is associated with two nodes. When a link/medium is shared among many nodes, the problem arises as to when each node should access the medium. This issue is addressed by a sublayer within the DLL: the medium access control (MAC) sublayer.

CS 455 Medium Access Control, Page 3 Two Approaches of MAC 1. Compete for the medium, with politeness ALOHA Protocol Slotted ALOHA Protocol Carrier Sense Multiple Access (CSMA) CSMA with Collision Detection (CSMA/CD) 2. Wait for Your Turn Token Passing Ring Token Passing Bus FDDI CS 455 Medium Access Control, Page 4 Carrier Sense Multiple Access (CSMA) listens to channel to see if another station is transmitting. If so, the station waits until the channel is idle. When the channel is idle, then the frame is transmitted. Collisions may still occur. How? If a collision occurs, the station waits random amount of time and retransmit. The longer the propagation delay, the longer the window and the worse the performance.

CS 455 Medium Access Control, Page 5 CSMA/Collision Detection (CSMA/CD) As a station transmits its own packet, it listens to the transmission and, if it detects a collision, it immediately aborts that transmission with a jamming signal. This reduces the amount of wasted time due to collisions. In the worst case, how long does a station take to detect a collision? 1 2 CS 455 Medium Access Control, Page 6 Binary Exponential Backoff To determine the number of slots to wait before re-sending: On first collision, wait either 0 or 1 slots. On second collision, wait either 0, 1, 2, or 3 slots. On third collision, wait either 0 to 7 slots. In general, after n collisions, wait anywhere from 0 to 2 n 1 slots, if n 10; or between 0 and 1023 slots, if n>10. After 16 collisions, give up and report that packet could not be sent.

CS 455 Medium Access Control, Page 7 Ethernet A broadcast-based LAN technology using CSMA/CD Ether was a hypothetic medium that, falsely assumed by many 19 century physicists, conducts electromagnetic waves. The name was chosen to emphasize the broadcast nature of the technology. The official standard is IEEE 802.3. The Ethernet technology comprises two parts: 1. a DLL/MAC layer that defines frame format, error detection method, CSMA/CD parameters, and so forth 2. a family of physical layer standards CS 455 Medium Access Control, Page 8 The Classic Ethernet Coaxial Cable 10 Mbp over coaxial cables physical layer standard 10Base5 called thick Ethernet standard 10Base2 called thin Ethernet

CS 455 Medium Access Control, Page 9 10Base5 each cable segment up to 500 meters 4 repeaters can be used to cascade 5 segments, resulting in a network of diameter 2,500 meters signal propagation delay in the cable is approximately 0.8 light speed each repeater introduces 0.5 µsec delay minimum frame length is 64 bytes; Why? the slot time in the exponential backoff algorithm is 51.2 µsec, the transmission time of 64 bytes at speed 10 Mbps CS 455 Medium Access Control, Page 10 Frame Format 64 48 48 16 Preamble Destination Source 368 to 12000 frame data 32 CRC Checksum Length of Data Preamble: 7 10101010 s followed by 10101011 marks the beginning of the frame and enables the receiver s clock to synchronize with the sender s Source Address: 48 bits each; first 24 bits vendor ID; second 24 bits assigned by the vendor all Ethernet addresses are globally unique

CS 455 Medium Access Control, Page 11 Destination Address: due to the broadcast nature of Ethernet, every frame will be seen by the physical layer modules at all stations only the physical layer module at the destination station delivers the frame to its DLL layer this filtering process is performed by hardware the destination address of all 1 s is called the broadcast address; frames destined to the address will be delivered to the DLL modules of all stations multicast (the transmission of a frame to a subset of stations) is also supported CS 455 Medium Access Control, Page 12 Length of Data: as its name suggests Frame Data: 0 to 1500 bytes when necessary, this field is padded to make the frame 64 byte long, from destination address to checksum CRC Checksum using CRC-32 generator polynomial

CS 455 Medium Access Control, Page 13 10Base-T: Twisted-Pair Ethernet twisted pair Hub uses the star topology uses two pairs of twisted-pair telephone type cable each cable segment up to 100 meter retains the 5 segment/4 repeater rule of 10Base5 CS 455 Medium Access Control, Page 14 Fast Ethernet 100 Mpbs uses the original Ethernet MAC and frame format but operates at ten times the speed The network diameter is reduced by a factor of 10. Why? Again, different physical layer standards support different transmission media: 100Base-T and 100Base-T4 for twisted pairs 100Base-F for fibers All these physical layer standards use the star topology.

CS 455 Medium Access Control, Page 15 Gigabit Ethernet 1 Gbps Basically the original Ethernet MAC and frame format operating at 100 times the speed. However, this extremely high speed forces two changes: A classic Ethernet frame has to be padded to a minimum length of 4K bits. Allows burst transmission, that is, the transmission of multiple frames once a station gains the right of the road. Currently only Fiber is supported (1000Base-F); twisted-pair standards are under development. CS 455 Medium Access Control, Page 16 MAC Approach Two: Wait for Your Turn A token circulates among all stations. the token is a miniature, 3-byte frame (including the start and end flags) When the token arrives at a station, the station either seizes the token and sends a frame or passes the token to the next station. Assuming that station i has a frame f to send to station j. 1. station i waits for the arrival of the token and seizes the token. 2. station i sends f to station i + 1, which in turns passes f to station i +2

CS 455 Medium Access Control, Page 17 3. when frame f arrives at station j, the network interface card (NIC) of station j picks up the frame, stores it in a buffer, and simultaneously forwards the frame to station j + 1, which will in turn passes f to station j +1 4. eventually, f returns to station i, which passes the token, rather than f, to station i +1 j i token CS 455 Medium Access Control, Page 18 Discussion This is a broadcast-based technology because all stations see every frame. The forwarding of both the token and data frames is performed by NICs in hardware. Difficulties arise when 1. a station is down 2. a station needs to be added to the LAN 3. the ring is broken 4. the token is lost we will not discuss the handling of these cases

CS 455 Medium Access Control, Page 19 When the medium is quite, a sending station 1. wastes no time in waiting with CSMA/CD 2. must wait for the arrival of the token with token-based approaches CSMA/CD outperforms token-based approaches in handling light traffic. However, token-based MAC handles heavy traffic loads better than CSMA/CD. no waste of bandwidth due to collisions CS 455 Medium Access Control, Page 20 Moreover, token-based MAC has advantages in handling real-time traffic (for example, the control of assembly lines) and multimedia traffic (where delays can be irritating). fair: stations access the medium in a round-robin manner predictable: a station can predict the next time the token returns to it (in CSMA/CD a station waits for a random period of time before retransmission) Three token-based LAN technologies 1. 802.4 token bus 2. 802.5 token ring 3. Fiber Distributed Data Interface (FDDI)

CS 455 Medium Access Control, Page 21 A Word about LAN and MAC The MAC technologies discussed in this talk are inherently LAN technologies. However, the reverse is not always true; many emerging LAN technologies are not broadcast-based and hence do not involve the MAC issue. ATM switched Ethernet