Media Access Control (MAC) Sub-layer and Ethernet

Similar documents
Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 3 Medium Access Control. Preface

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication

Contention Protocols and Networks

Ethernet. Introduction. CSE 3213 Fall 2011

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

ECE 4450:427/527 - Computer Networks Spring 2017

Introduction to Networks and the Internet

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

EE 122: Ethernet and

Summary of MAC protocols

Medium Access Protocols

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Multiple Access Protocols

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science

Data and Computer Communications

Link Layer and Ethernet

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

LAN PROTOCOLS. Beulah A AP/CSE

Link Layer and Ethernet

More on LANS. LAN Wiring, Interface

Principles behind data link layer services

2. LAN Topologies Gilbert Ndjatou Page 1

Chapter 8 LAN Topologies

Communication (III) Kai Huang

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Data and Computer Communications. Chapter 11 Local Area Network

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Lecture 4b. Local Area Networks and Bridges

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

CSE 461: Multiple Access Networks. This Lecture

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Access Technologies! Fabio Martignon

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Introduction to Computer Networks. IEEE Ethernet

Medium Access Control Sublayer

Lecture 8: Switched Ethernet and Collision Domains

Computer Networks. Medium Access Sublayer (Part I)

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

ET4254 Communications and Networking 1

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Ethernet. Networks: Ethernet 1

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

The Link Layer and LANs. Chapter 6: Link layer and LANs

Redes de Computadores. Medium Access Control

EECS 122, Lecture 7. Kevin Fall Jean Walrand

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Internet Architecture and Protocol

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

LAN Systems. Bus topology LANs

Principles behind data link layer services:

Principles behind data link layer services:

Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Computer and Network Security

Extending the LAN. Context. Info 341 Networking and Distributed Applications. Building up the network. How to hook things together. Media NIC 10/18/10

The Link Layer II: Ethernet

Local Area Network Overview

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Outline: Connecting Many Computers

CPE 548 Exam #1 (50 pts) February 17, 2016

Local Area Networks (LANs) SMU CSE 5344 /

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Random Assignment Protocols

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

COMP/ELEC 429/556 Introduction to Computer Networks

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

CS 455/555 Intro to Networks and Communications. Link Layer

10- and 100-Mbps Ethernet

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Links. CS125 - mylinks 1 1/22/14

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

Chapter 15 Local Area Network Overview

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University

Medium Access Control Sublayer Chapter 4

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

CS343: Data Communication LAN Overview

Networking Technologies and Applications

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Link Layer Review. CS244A Winter 2008 March 7, 2008 Ben Nham

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Applied Networks & Security

Transcription:

Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF

MAC Sub-layer The MAC sub-layer is a sub-layer of the Data Link Layer and is used to determine how to allocate a single broadcast channel among competing users (e.g. in a LAN). The traditional way of allocating a single channel are FDM and TDM. These schemes are not efficient for computer generated traffic which is bursty. Many of the N users may be idle for long periods of time and channels will be underutilized. Also, if more than N users want to communicate, they will be denied access for lack of bandwidth. Hence we need a dynamic channel allocation scheme in LANs.

MAC Sub-layer LAN devices share the channel and the MAC protocols provide the means of controlling access to the channel. MAC categories: 1. Round Robin: Each station in turn is given the opportunity to transmit. The station may decline to transmit or may transmit subject to a specified upper bound (time). The station relinquishes its turn when done. E.g. Token Ring (IEEE 802.5) This scheme works well when many stations have data to transmit over an extended period of time (repeatedly), else the overhead of passing the turn will become excessive. 2. Contention: For bursty traffic, this is appropriate. No control is exercised to determine whose turn it is. All stations contend for time on the medium. They simple to implement but performance drops drastically under heavy load. E.g. Ethernet (IEEE 802.3)

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) CSMA/CD is the MAC protocol for bus LANs such as the Ethernet. A station wishing to transmit listens to the medium to determine if another transmission is in progress (carrier sense). If the line is idle is busy, station waits (keeps sensing it till the line becomes idle). Else it transmits. It is possible that two or more stations may attempt to transmit at the same time. If so, there will be a collision. If there is a collision, a station waits a random amount of time and then attempts to transmit again.

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Let the time for a signal to propagate between the two farthest stations be (in the above case A and C) be T pd. At t 0, A begins transmitting. At (T p s), an instant before the signal arrives at the most distant station C, that station also begins transmitting. The station C detects the collision almost instantly and stops, but the little noise burst caused by the collision does not get back to the original station until time (2T pd s). In other words, in the worst case a station cannot be sure that it has seized the channel until it has transmitted for 2T pd without hearing a collision. So frames must be long enough to allow collision detection prior to end of transmission (frame transmission time> 2 max * Prop. Delay)

IEEE 802.3 (Ethernet): Bus Topology The Ethernet uses CSMA/CD MAC protocol. A transmission from any station propagates the length of the medium in both directions and can be received by all other stations. A station copies down frames addressed to it.

IEEE 802.3 (Ethernet) Cabling 10Base5 cabling: This type of cabling is popularly referred to as thicknet. It was one of the earliest types of cables used for LAN s. The notation 10Base5 suggests that the LAN operates at 10 Mbps, uses baseband signaling and can support segments of up to 500 meters. 10Base2 cabling: 10Base2 or thinnet, which in contrast to thicknet, bends easily. 10Base2 cables are easier to install and are relatively inexpensive. The only drawback of using the 10Base2 cable is that it can run for only 200 meters and can handle only 30 stations per cable segment. 10Base-T cabling: there is no single, main cable because each station has a cable running to a central hub (a big repeater). Adding or removing stations is simpler in this configuration and cable breaks can be detected easily. The disadvantage of 10Base-T is that the maximum cable run from the hub is only 100 meters, sometimes 150 meters (if high quality twisted pairs are used). 10Base-T is most popular due to the ease of maintenance.

IEEE 802.3 (Ethernet) Hub

IEEE 802.3 (Ethernet) IEEE 802.3 has a certain maximum cable length/segment. To allow larger networks, multiple cables are connected by repeaters which amplifies and retransmits signals in both directions. Maximum distance between any 2 stations is 2500 m (with 5 segments each of 500 m) and no more than 4 repeaters can separate any 2 stations.

IEEE 802.3 (Ethernet) Frame Format Preamble: 7 bytes long and contains the pattern 101010. This allows the receiver s clock to synchronize with the sender s clock. Start of frame (SOF): byte is 10101011 and denotes the start of the frame. Addresses: These are the MAC addresses and 6 bytes each. These addresses are globally unique addresses for the NIC cards. E.g. 00:A0:C9:14:C8:29 (in hex). Length: how many bytes are present in the data field. Data: this is the IP packet carried in the Ethernet frame and can be 0-1500 bytes. Pad: field is used to pad out the frame in case the data field is less than 46 bytes since the frame must be at least 64 bytes long (18 + 46 = 64 bytes)

IEEE 802.3 (Ethernet) Performance Efficiency (line utilization) decreases as the number of stations trying to transmit (under heavy load) increases due to the increased probability of collisions. 30% line utilization (or 3 Mbps throughput) is considered heavy load. Larger the frame size the higher the efficiency or utilization (due to higher payload since the header size of the frame is fixed).e.g. for 1024 byte frame, efficiency is about 85% and for a 64-byte frame, efficiency is about 30%.

IEEE 802.3 (Ethernet) Switch As traffic increases (due to increased number of stations) the LAN will eventually saturate. The solution is a switched 802.3 LAN. The switch has a high-speed backplane and 4 to 32 plugin cards. Each card has 1 to 8 connectors for 802.3 connections to stations. On possibility is that each plugin card can be a collision domain running CSMA/CD. So only 1 transmission/card is possible but all cards can be transmitting in parallel at 10 (or 100 or 1000) Mbps. The other possibility is that each input port is buffered and so incoming frames are stored in RAM on each card. This design allows all input ports to transmit in parallel at 10 (or 100 or 1000) Mbps. Collisions thus do not occur. Throughput approaches 10 (or 100 or 1000) Mbps.

IEEE 802.3 (Ethernet) Switch

Why must the IEEE 802.3 (Ethernet) frame be at least 64 bytes long? 802.3 FRAME HAS: ETHERNET HEADER = 18 BYTES [DST MAC(6) + SRC MAC(6) + LENGTH (2) +CRC(4)] MINIMUM DATA PORTION = 46 BYTES MINIMUM ETHERNET FRAME SIZE = 64 BYTES FRAMES MUST BE AT LEAST 64 BYTES LONG, NOT INCLUDING THE PREAMBLE, SO, IF THE DATA FIELD IS SHORTER THAN 46 BYTES, IT MUST BE COMPENSATED BY THE PAD FIELD. THE REASON FOR SPECIFYING A MINIMUM LENGTH LIES WITH THE COLLISION-DETECT MECHANISM. IN CSMA/CD A STATION MUST NEVER BE ALLOWED TO BELIEVE IT HAS TRANSMITTED A FRAME SUCCESSFULLY IF THAT FRAME HAS, IN FACT, EXPERIENCED A COLLISION. IN THE WORST CASE IT TAKES TWICE THE MAXIMUM PROPAGATION DELAY ACROSS THE NETWORK BEFORE A STATION CAN BE SURE THAT A TRANSMISSION HAS BEEN SUCCESSFUL.

Why must the IEEE 802.3 (Ethernet) frame be at least 64 bytes long? Calculations: LAN Length (L) = 500 m (per segment) x 5 segments = 2500 meters Velocity of propagation on the cable (V) = 2 * 10 8 meters/sec Delay added by repeater (D) = ~3uSec x 2 (Bi-Direction) x 4 Repeaters = 24uSec Round Trip Delay (RTD) = (Total Distance/V) + Repeater Delays (D) Total Distance/V = (2*2500/2 * 10 8 ) = 25 * 10-6 sec or 25usec Hence RTD = 25 + 24 = 49 usec Now, time to transmit 64 bytes = 512 bits / 10 * 10 6 = 51.2 10-6 sec or 51.2 usec (referred to as slot time in the 802.3) which is greater than the RTD of 49 usec. Hence the minimum frame size for the IEEE 802.3 (Ethernet) is 64 bytes.

Fast Ethernet Fast Ethernet operates at 100Mbps. For the most part, the scheme/protocol remains the same as the 10Mbps case, except now the maximum length of the network is shortened. Minimum frame size is still kept at 64 bytes (for backward compatibility), which now arrive 10 times faster than they do in 10Mbps Ethernet. Hence the maximum length of the network must be 10 times smaller or about around 250 meters.

Ethernet Switch Hierarchy: Switch to Switch Upgrade

Ethernet Switch Hierarchy: Switch to Switch Upgrade The connection between the switches was previously at 100 Mbps. To make the upgrade to Gigabit Ethernet, switches are replaced with new 100/1000 Mbps switching hardware, along with 1000 Mbps bandwidth between switches.

Ethernet Switch Hierarchy: Switch to Server Upgrade

Ethernet Switch Hierarchy: Switch to Server Upgrade The switch to server upgrade will include changing a current 100 Mbps switch to a 1 Gbps switch.

Gigabit Ethernet Carrier extension for 1 Gbps Ethernet.