Local Area Networks (LANs) SMU CSE 5344 /

Similar documents
ECE 4450:427/527 - Computer Networks Spring 2017

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Data and Computer Communications. Chapter 11 Local Area Network

CSE 461: Multiple Access Networks. This Lecture

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

CSE/EE 461 Wireless and Contention-Free Protocols

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Chapter 6 Medium Access Control Protocols and Local Area Networks

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Data Link Layer -2- Network Access

Ethernet. Introduction. CSE 3213 Fall 2011

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Multiple Access Protocols

Data Link Layer -2- Network Access

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CSMA/CD (Collision Detection)

The Link Layer and LANs. Chapter 6: Link layer and LANs

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

EE 122: Ethernet and

Data Link Layer, Part 5. Medium Access Control

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Contention Protocols and Networks

Redes de Computadores. Medium Access Control

Data Link Layer: Collisions

CS 455/555 Intro to Networks and Communications. Link Layer

Data and Computer Communications

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Chapter 15 Local Area Network Overview

Data Link Layer, Part 3 Medium Access Control. Preface

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Multiple Access Links and Protocols

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Medium Access Control Sublayer Chapter 4

Chapter 5 Link Layer and LANs

ET4254 Communications and Networking 1

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Networking Technologies and Applications

Local Area Network Overview

COS 140: Foundations of Computer Science

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

CMPE 257: Wireless and Mobile Networking

CSE 461 Multiple Access. David Wetherall

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

CSC 4900 Computer Networks: The Link Layer

Link Layer and Ethernet

Chapter 11 in Stallings 10 th Edition

LAN PROTOCOLS. Beulah A AP/CSE

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

MULTIPLE ACCESS PROTOCOLS 2. 1

Data Link Layer Technologies

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Data Link Layer: Multi Access Protocols

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Chapter 12 Multiple Access 12.1

Lecture 6: Example LAN: Ethernet

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks

Computer Networks. Medium Access Sublayer (Part I)

COMMUNICATION NETWORKS NETW 501

Access Technologies! Fabio Martignon

Link Layer and Ethernet

Local Networks. Lecture 4 6-Apr-2016

Medium Access Control Sublayer

Direct Link Communication II: Wired Media. Multi-Access Communication

Chapter 5: Link layer

Wireless Communications

Internet Architecture and Protocol

Links. CS125 - mylinks 1 1/22/14

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Outline: Connecting Many Computers

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Medium Access Protocols

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

COS 140: Foundations of Computer Science

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Multiple Access. Data Communications and Networking

Chapter 4. The Medium Access Control Sublayer

Computer Networks Principles LAN - Ethernet

ECEN 5032 Data Networks Medium Access Control Sublayer

Introduction to Networks and the Internet

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CSE/EE 461 Section 2

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

1999, Scott F. Midkiff

Transcription:

Local Area Networks (LANs) SMU CSE 5344 / 7344 1

LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2

Topologies Topology: the shape of a communication system Most popular topologies for LAN: Star Ring Tree Bus Logical topology vs. Physical topology Logical topology: The way data passes through the network Physical topology: physical structure of the network SMU CSE 5344 / 7344 3

Star Topology Central component of star network is called a hub Separate connections to the hub More expensive than linear topology because of cost of concentrators more cables SMU CSE 5344 / 7344 4

Star Topology in Practice Parallel cables feeding from the hub Look like this SMU CSE 5344 / 7344 5

Ring Topology Computers are connected in a closed loop Connections go directly from one computer to another First passes data to second, second passes data to third, etc Ring ease synchronization; may be disabled if any cable is cut IBM token ring implementation. A token is passed around May be disabled if any cable is cut SMU CSE 5344 / 7344 6

Tree Topology Point-to-point wiring for individual segments Common backbone Overall length of each segment is limited by the type of cabling used If the backbone line breaks, the entire segment goes down More difficult to configure and wire than other topologies. SMU CSE 5344 / 7344 7

Bus Topology Shared cable Each computer has its own connection to the shared cable Shared medium forms the backbone of the network Synchronization only one computer transmits at a time Bus requires fewer cables; may be disable if main cable is cut SMU CSE 5344 / 7344 8

Choice of Topology Reliability Expandability Performance SMU CSE 5344 / 7344 9

LAN Operations LAN properties Control layer managing bits Communication layer getting attention Accommodating multiple access SMU CSE 5344 / 7344 10

LAN Architecture Properties Data transmitted as addressed frames No routing required Necessary OSI Layers Layer 1 - Physical layer Layer 2 - Data link layer Layer 3? SMU CSE 5344 / 7344 11

LAN Operations LAN properties Control layer managing bits Communication layer getting attention Accommodating multiple access SMU CSE 5344 / 7344 12

Functions of LAN Protocol Highest Level Layers Provide one or more SAPs Assemble data into frames, with address and CRC fields On reception, disassemble frame, perform address recognition and CRC validation Govern link access (e.g., CAC) SMU CSE 5344 / 7344 13

Protocol Layers (cont d) Physical Layer Encode/decode signals Bit transmission/reception Modulation PHY DSSS FH IR OFDM PLCP Sublayer PMD Sublayer PHY layer Management Direct Sequence Spread Spectrum Frequency Hoping Physical Layer Convergence Procedure (PLCP) Physical Medium Dependent (PMD) sub-layers. SMU CSE 5344 / 7344 14

MAC Frame Format MAC control - information such as priority Destination MAC address Source MAC address LLC data CRC (Frame Check Sequence field) LLC MAC Service Interface MAC Mgmt Service Interface LLC MAC sublayer MAC Layer Management WEP MAC PHY MAC Mgmt DSSS FH IR OFDM PHY Service Interface PLCP Sublayer PMD Sublayer PHY layer Management SMU CSE 5344 / 7344 15

Logical Link Control Specifies addressing method and controls data exchange Independent of topology, medium, and medium access control Unacknowledged connectionless service higher layers handle error/flow control, or simple apps Acknowledged connectionless service no prior connection necessary Connection-mode service devices without higher-level software SMU CSE 5344 / 7344 16

Medium Access Control Provides a means of controlling access to a shared medium Two techniques in wide use CSMA/CD Token passing LLC frames data, passes it to MAC which frames it again MAC control (e.g. priority level) Destination physical address Source physical address SMU CSE 5344 / 7344 17

LAN Operations LAN properties Control layer managing bits Communication layer getting attention Accommodating multiple access SMU CSE 5344 / 7344 18

Overview of MAC Protocols How do you access a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic), ALOHA, S-ALOHA, CSMA, CSMA/CD Taking-turns polling token passing SMU CSE 5344 / 7344 19

(Pure) Aloha Station sends a frame whenever it has one Waits for a time equal to the round-trip (RTT) for the signal If the station does not receive an acknowledgment by then, resend the frame Channel utilization very poor (18%) SMU CSE 5344 / 7344 20

Pure ALOHA Success (S), Collision (C), Empty (E) slots In pure ALOHA, frames are transmitted at completely arbitrary times. SMU CSE 5344 / 7344 21

Pure ALOHA Vulnerable period for the shaded frame. SMU CSE 5344 / 7344 22

Slotted Aloha The stations synchronize using a central clock transmission time divided into equal slots Stations are allowed to transmit only at the beginning of the slot Improved channel utilization (37%) due to reduced conflict time SMU CSE 5344 / 7344 23

Efficiency of Aloha S = throughput = goodput (success rate) 0.4 0.3 0.2 0.1 Slotted Aloha Pure Aloha 0.5 1.0 1.5 2.0 G = offered load = Np SMU CSE 5344 / 7344 24

Dynamics of Aloha: Effects of Fixed Probability as We Vary the Number of Active Users desirable stable point successful transmission rate new arrival rate undesirable stable point 0 m Lesson: if we fix p, as N varies: 1) the efficiency is low; 2) may have an undesirable stable point n: number of backlogged stations SMU CSE 5344 / 7344 25

Summary: Problems of Aloha Protocols Low efficiency Pure Aloha Slotted Aloha Undesirable steady state at a fixed transmission rate, when the number of backlogged stations varies Need a better access protocol SMU CSE 5344 / 7344 26

Carrier Sense Multiple Access (CSMA) Based on the observation that signal propagation delay is much smaller than the transmission time Tp: signal propagation delay = distance/signal velocity signal velocity 3 * 108 m/s: free space, optical fiber (300m/us) 2 * 10 8 m/s: copper medium (200m/us) TTx: transmission delay = N/R N=number of bits per frame R = bit rate time to generate bit stream determined by data rate & frame length SMU CSE 5344 / 7344 27

Carrier Sense Multiple Access (CSMA) Listen before you talk don t interrupt If the channel is free send the frame and wait for the acknowledgment If the channel is busy Non-persistent retry 1-persistent retry - most popular p-persistent retry SMU CSE 5344 / 7344 28

Carrier Sense Multiple non-persistent CSMA Access (CSMA) On finding channel busy, station backs-off for a random amount of time and tries later 1-persistent CSMA On finding channel busy, station continues listening and transmits when channel becomes idle p-persistent CSMA On finding channel idle, station transmits with a probability of p, backs-off and tries again when channel is busy SMU CSE 5344 / 7344 29

Collisions can occur: propagation delay means two nodes may not hear each other s transmission CSMA Collisions spatial layout of nodes along Ethernet Collision: entire packet transmission time wasted still not very efficient! SMU CSE 5344 / 7344 30

CSMA/CD (Ethernet) Extension of CSMA polite conversation collisions detected within short time Listen even after transmission has started If a collision is detected during transmission, cease transmission reduces channel wastage wait a random amount of time SMU CSE 5344 / 7344 31

CSMA/CD How long to wait for collision detection? SMU CSE 5344 / 7344 32

CSMA/CD Collision Detection instead of wasting the whole packet transmission time, abort after detection. SMU CSE 5344 / 7344 33

Binary Exponential Backoff If colliding for the first time, wait 0 or 1 time slots (random) Second time wait 0, 1, 2, or 3 slots Third time wait anywhere from 0-7 slots After n collisions wait anywhere from 0-2^n 1 give up after 16 SMU CSE 5344 / 7344 34

CSMA/CD Collision detection: easy in wired LANs: measure signal strengths, compare transmitted, received signals difficult in wireless LANs: receiver shut off while transmitting SMU CSE 5344 / 7344 35

Persistent and Nonpersistent CSMA SMU CSE 5344 / 7344 36

Collision-free Protocols Collision-free protocols: Assume a fixed number of stations (N) each with a unique address 0..N-1 wired into hardware. Uses contention slots where stations can broadcast their intent to transmit SMU CSE 5344 / 7344 37

Collision-free Protocols Bit-map protocol: 1 bit per station overhead Contention (or reservations) slots (bits 0..N-1) followed by actual transmission of data frames (d bits each) At low load, channel efficiency = d/(d+n), since d data bits are transmitted for every N bits of contention slots. At high load, channel efficiency = d/(d+1) SMU CSE 5344 / 7344 38

Collision-Free Protocols Binary Countdown Protocol Scheme attempts to eliminate the contention slot overhead the 1 bit per station scalability problem by using binary station addressing Each station has a unique binary address. Stations who wish to contend for a slot transmit their address bit by bit prior to actual data frame transmission. If a station with a 0-bit contends with a 1-bit, then the station that sent 0 stops contention. This continues until the last address bit is transmitted. No collisions as higher-order bit positions are used to arbitrate between stations wanting to transmit Higher numbered stations have a higher priority SMU CSE 5344 / 7344 39

IEEE 802.2: IEEE 802.3: IEEE 802.4 IEEE 802.5: IEEE 802.6: IEEE 802.9: IEEE 802.x Standards Logic link control (LLC) layer of data link layer Ethernet Token bus, an old protocol Token ring IEEE 802.11: Wireless LAN IEEE 802.12: 100Base-VG IEEE 802.13: 100Base-X IEEE 802.14: Cable modem Distributed queue dual bus (DQDB) protocol, similar to FDDI Integrated voice and data networking, including ISDN SMU CSE 5344 / 7344 40

IEEE Standard 802.3 1-persistent CSMA/CD: A station keep listening to the cable until it is idle; it then starts transmitting its data frame the moment it detects a collision, it terminates its transmission after a collision, a station waits for a random time and starts repeating the above steps Ethernet is only one product that follows the 802.3 standard. There could be several variations of this SMU CSE 5344 / 7344 41

IEEE Standard 802.4: Token Bus Why 802.4? 802.3 does not support priorities, it is not deterministic Token Bus physically linear or tree-structured, but logically a ring Each station has a unique address Each station knows the address of its left and right neighbors in the logical ring. The cable is a broadcast medium So logical neighbors are not necessarily physical neighbors. Each station has several priority queues (0,2,4,6). SMU CSE 5344 / 7344 42

IEEE Standard 802.5: Token Ring Not a broadcast medium; a physical ring topology A token (a special bit pattern) circulates around the ring when all stations are idle The length of a bit on the cable If the speed of propagation is 200 meters/usec and if the speed of transmission is 1 Mbps or 1 bit/usec each bit occupies 200 meters on the ring. A 1 km ring can hold 5 bits Consists of ring interfaces to which stations are connected Each bit arriving at an interface is copied into a 1-bit buffer May be modified and copied out into the ring again Copying and inspection introduces a 1-bit delay SMU CSE 5344 / 7344 43

DQDB - IEEE 802.6 Shared medium Fixed length packets Dual bus Designed for metropolitan area networks SMU CSE 5344 / 7344 44

Synchronization and Timing Transmission consists of steady stream of fixed size slots Head (A/B) responsible for generating the slots for bus A/B Operation controlled by a 125 µs clock Number of slots per cycle depends on the physical bandwidth SMU CSE 5344 / 7344 45

Protocol Architecture Physical Layer DQDB Layer Service Layer (LLC) Connection-less data service Connection oriented service Isochronous service (voice, video) SMU CSE 5344 / 7344 46

MAC Protocol Distributed Queue Access Control Pre-arbitration for isochronous (BW) set Distributed queue arbitration Reservation-based distributed scheme Implemented through two counters (RQ request - and CD -countdown) At light load the delay is very small similar to CSMA/CD At heavy loads highly efficient as in the case of token ring SMU CSE 5344 / 7344 47

Bandwidth Balancing (BWB) Protocol slightly unfair to the nodes towards the middle of the bus Two active nodes, separated by D timeslots Downstream node sets RQ bit Upstream node uses all available slots Takes D timeslots for Request to arrive Takes D timeslots for empty slot to arrive In general, P(available slots) decreases the further downstream a node is connected Without BWB, a node may transmit a segment when CD is 0 and the current QA slot is free SMU CSE 5344 / 7344 48

Bandwidth Balancing (BWB) Without BWB, a node may transmit a segment when CD is 0 and the current QA slot is free BWB is done by restricting transmission to a fraction of unused slots Achieved by artificially incrementing RQ after transmitting n segments BWB counter incremented every time a node transmits a segment When counter reaches 0 the node must skip next free slot SMU CSE 5344 / 7344 49

End of Class 2 SMU CSE 5344 / 7344 50