The Medium Access Sublayer

Similar documents
Raj Jain. The Ohio State University Columbus, OH

LLC and Bridges. Raj Jain. Professor of CIS. The Ohio State University

The Link Layer and LANs

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks

Part3. Local Area Networks (LAN)

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

LAN PROTOCOLS. Beulah A AP/CSE

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

IEEE 802 LANs SECTION C

Data and Computer Communications

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Redes de Computadores. Medium Access Control

Data Link Layer, Part 3 Medium Access Control. Preface

ET4254 Communications and Networking 1

Computer Networks Principles LAN - Ethernet

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Reminder: Datalink Functions Computer Networking. Datalink Architectures

IEEE standards for local area networks

Lecture 4b. Local Area Networks and Bridges

Chapter 15 Local Area Network Overview

Lecture 05 Chapter 16 High Speed LANs

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Data Link Layer, Part 5. Medium Access Control

Direct Link Communication II: Wired Media. Multi-Access Communication

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Introduction to LAN Protocols

Local Area Networks (LANs) SMU CSE 5344 /

Chapter 4: The Medium Access Layer

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Access Technologies! Fabio Martignon

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Networking Technologies and Applications

! High Data Rates (0.1 Mbps to 10 Gbps)! Short Distances (0.1 to 40 km) ! Low Error Rate (10 to 10 ) Local Area Networks

Contention Protocols and Networks

Chapter 6 Local Area Networks and Media Access Control. School of Info. Sci. & Eng. Shandong Univ.

Direct Link Communication II: Wired Media. Multi-Access Communication

Chapter 4. The Medium Access Control Sublayer

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Internet Architecture and Protocol

Computer Networks. Medium Access Sublayer (Part I)

Chapter 12 Multiple Access 12.1

Medium Access Protocols

Medium Access Control Sublayer

Summary of MAC protocols

CSE 461: Multiple Access Networks. This Lecture

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Local Area Networks. Ethernet LAN

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Chapter 11 in Stallings 10 th Edition

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

EE 122: Ethernet and

Data and Computer Communications. Chapter 11 Local Area Network

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Chapter 6 Medium Access Control Protocols and Local Area Networks

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Local Area Network Overview

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Ethernet. Agenda. Introduction CSMA/CD Elements and Basic Media-Types Repeater, Link Segments Framing. L21 - Ethernet

Origin of IEEE (Ethernet) Ethernet. Agenda. Basic Idea of Ethernet Bus System

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

COS 140: Foundations of Computer Science

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Introduction to LAN Protocols

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Data Link Layer -2- Network Access

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Campus Network Design

Local Networks. Lecture 4 6-Apr-2016

Data Link Layer -2- Network Access

CSE 461 Multiple Access. David Wetherall

Ethernet Standard. Campus Network Design. Ethernet address. OSI Model. Thana Hongsuwan

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

Lecture 6: Example LAN: Ethernet

Link Layer and Ethernet

EECS 122, Lecture 7. Kevin Fall Jean Walrand

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

Protocols for Multiaccess Networks

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

Multiple Access Protocols

Link Layer and Ethernet

COS 140: Foundations of Computer Science

ECE 4450:427/527 - Computer Networks Spring 2017

Data Link Layer: Collisions

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Multiple Access Channels

Local Area Networks (LANs) and Legacy Ethernet

Local Area Networks (LANs) and Legacy Ethernet

Medium Access Control Sublayer Chapter 4

Ethernet. Computer Networks. Lecture 4.

Chapter 9 Ethernet Part 1

Transcription:

The Medium Access Sublayer shivkuma@ecse.rpi.edu http://www.ecse.rpi.edu/homepages/shivkuma 1-1 Based in part upon the slides of Prof. Raj Jain (OSU), K. Vastola (RPI) Overview Multiple Access: Aloha, Slotted Aloha, CSMA/CD IEEE 802 LANs: Ethernet, Token Ring, LLC Bridges: Transparent, Source Routing, Remote High Speed LANs: Fast Ethernet 1-2

The MAC Layer Problem Single communications channel shared by many spatially distributed users who can communicate only through this channel. A MAC protocol is a set of rules employed independently by each multi-access user to gain access to the channel (a distributed algorithm) Classification: Fixed Assignment Protocols: TDMA, FDMA, CDMA Random Access Protocols: Aloha, CSMA, CSMA/CD Demand Assignment Protocols: Polling, Token Passing 1-3 Fixed Assignment Multiaccess Protocols Oldest and conceptually simplest approach Basic idea: assign each user a fixed portion of channel resources ( spatial multiplexing ) Ways to do it: Time: Time Division Multiple Access (TDMA) Divide time into equal-length slots and allocate one slot per-user in turn (round-robin fashion). A TDMA frame : set of N slots (one per user) Note: TDMA is distributed TDM 1-4

Fixed Assignment Multiaccess Protocols Frequency/bandwidth: FDMA User gets frequency band and can transmit continuously in that band. Matches need of continuous streams (eg analog video) Bandwidth wasted due to guard bands All-optical networks uses variant: WDMA Combination of time/frequency: CDMA Code Division Multiple Access Divvy up both time and frequency into a 2-d grid of slots Frequency Hopping CDMA: each user is assigned a different frequency in each time slot 1-5 Fixed Assignment: Performance Fixed assignment protocols ideal for continuous streams, but bad for data because it exploits only spatial multiplexing. With ideal statistical multiplexing ( using channel when packets are waiting ), M/M/1 queueing analysis says that the mean delay: E(T) = 1/(µ-λ), where λ is the mean arrival rate and µ is the mean service rate With fixed assignment, each channel has service rate µ/n and assuming arrival rates of λ/n, and separate M/M/1 queues, we find: E(T) = 1/(µ/N - λ/n) = N/(µ-λ) So, use of fixed assignment protocols for packet switched data implies an increase in mean delay by a factor of N!! 1-6

Random Access Protocols Fundamentally different approach. Aloha at Univ of Hawaii: Transmit whenever you like. Random retransmission time. Worst case utilization = 1/(2e) =18% Slotted Aloha: Fixed size transmission slots Worst case utilization = 1/e = 37% CSMA: Carrier Sense Multiple Access Listen before you transmit CSMA/CD: CSMA with Collision Detection Listen while transmitting. Stop if you hear someone else 1-7 Let frame time = 1 Aloha Performance S = New Traffic in Number of frames/unit time S = 1 Fully loaded system G = New frames + Retransmissions = Total load S = GP[0] P[k frames/unit time] = G k e -G /k!, k=1,2,3,... P[0] = e -2G, assuming a window of vulnerability of normalized length 2 units = P[no attempts in 2 time units] P[0] = success rate/attempt rate = S/G. Equating the above two results, we get: S = Ge -2G => Max S = 1/2e, at G=0.5 For Slotted Aloha: S = Ge -G Max S = 1/e at G=1 1-8

Aloha Performance (cont) 1-9 CSMA Sense the carrier (radio lingo) before transmitting 1-persistent CSMA: If the channel is idle, transmit If the channel is busy, wait until idle and transmit 0-persistent CSMA: If the channel is busy, go away for a random period of time p-persistent CSMA: Applies to slotted channels. If the channel is busy, wait until next slot. If the channel is idle, transmit with a probability p or wait until next slot with probability 1-p Slot length = propagation delay 1-10

CSMA Performance 1-11 CSMA/CD Collision detection can take as long as 2 One-way propagation delay Packet time > 2τ = 51.2 µs = 64 bytes at 10 Mbps 1-12

CSMA/CD Performance Efficiency= Max throughput/line rate = P/(P+2τ/A) Where, P = Frame time τ = one-way propagation delay A = P[only one station transmits during a slot ] = fn{# of stations trying to transmit} = 1/e for infinite stations Efficiency = 1/(1+2α/A) Where α = Propagation delay/frame time = (Distance/Speed of signal)/(frame size/data rate) = (Distance Data Rate)/(Frame Size Signal Speed) Efficiency is a decreasing function of α 1-13 CSMA/CD Performance Fig 4-23 1-14

IEEE 802.3 CSMA/CD If the medium is idle, transmit (1-persistent). If the medium is busy, wait until idle and then transmit immediately. If a collision is detected while transmitting, Transmit a jam signal for one slot (= 51.2 µs = 64 byte times) Wait for a random time and reattempt (up to 16 times) Random time = Uniform[0,2 min(k,10) -1] slots truncated binary exponential backoff 1-15 Thick coax 10Base5 Cabling Rules Length of the cable is limited to 2.5 km, no more than 4 repeaters between stations No more than 500 m per segment 10Base5 No more than 2.5 m between stations Transceiver cable limited to 50 m Terminator 2.5m Tranceiver 500 m Repeater 1-16

802.3 PHY Standards 10BASE5: 10 Mb/s over coaxial cable (ThickWire) 10BROAD36: 10 Mb/s over broadband cable, 3600 m max segments 10BASE2: 10 Mb/s over thin RG58 coaxial cable (ThinWire), 185 m max segments 1BASE5: 1 Mb/s over 2 pairs of UTP 10BASE-T: 10 Mb/s over 2 pairs of UTP 10BASE-F: Fiber Optic inter-repeater link (FOIRL), 10BASE-FL (link), 10BASE-FB (backbone), or 10BASE-FP (Passive) 1-17 10BASE5 vs 10BASE-T R R R 1-18

Manchester Encoding Manchester: 1= down, 0 = up Differential Manchester: 0 = Transition, 1=No transition 1-19 Ethernet Address Format Multicast/ Unicast Global/ Local Organizationally Unique ID 1 1 22 24 Multicast = To all bridges on this LAN Broadcast = To all stations = 111111...111 = FF:FF:FF:FF:FF:FF 1-20

Frame Format Ethernet IP IPX AppleTalk Dest. Source Type Info CRC Address Address 6 6 2 4 Size in bytes IEEE 802.3 IP IPX AppleTalk Dest. Source Length Address Address 6 6 2 LLC Length Info Pad CRC 4 1-21 Fast Ethernet Standards 100BASE-T4: 100 Mb/s over 4 pairs of CAT-3, 4, 5 100BASE-TX: 100 Mb/s over 2 pairs of CAT-5, STP 100BASE-FX: 100 Mbps CSMA/CD over 2 fibers 100BASE-X: 100BASE-TX or 100BASE-FX 100BASE-T: 100BASE-T4, 100BASE-TX, or 100BASE-FX Based on 100BASE-T FDDI Phy 100BASE-T4 100BASE-X 100BASE-T2 100BASE-TX 1-22 100BASE-FX

100 BASE-X X = Cross between IEEE 802.3 and ANSI X3T9.5 IEEE 802.2 Logical Link Control IEEE 802.3 CSMA/CD IEEE 802.3 PHY Coding IEEE 802.3 Medium Attachment Unit ANSI X3T9.5 MAC ANSI X3T9.5 PHY ANSI X3T9.5 PMD 1-23X 100BASE-X Interconnection Devices Repeater: PHY device that restores data and collision signals Hub: Multiport repeater + fault detection and recovery Bridge: Datalink layer device connecting two or more collision domains. MAC multicasts are propagated throughout extended LAN. Router: Network layer device. IP, IPX, AppleTalk. Does not propagate MAC multicasts. Switch: Multiport bridge with parallel paths These are functions. Packaging varies. 1-24

Interconnection Devices LAN= Collision Domain H H B H H Extended LAN =Broadcast domain Router Application Transport Network Datalink Physical Gateway Router Bridge/Switch Repeater/Hub 1-25 Application Transport Network Datalink Physical Transparent Bridges Bridges learn the location of stations by monitoring source addresses Stations do not realize that there is a bridge between them Transparent 1-26

Transparent Bridges (cont) They avoid loops by forming a spanning tree Spanning tree bridges 1-27 Ethernet vs Fast Ethernet Ethernet Fast Ethernet Speed 10 Mbps 100 Mbps MAC CSMA/CD CSMA/CD Network diameter 2.5 km 205 m Topology Bus, star Star Cable Coax, UTP, Fiber UTP, Fiber Standard 802.3 802.3u Cost X 2X R R 1-28

Full-Duplex Ethernet Uses point-to-point links between TWO nodes Full-duplex bi-directional transmission Transmit any time Not yet standardized in IEEE 802 Many vendors are shipping switch/bridge/nics with full duplex No collisions 50+ Km on fiber. Between servers and switches or between switches 1-29 Gigabit Ethernet Uses switched-architecture, not shared => no GbE hubs Micro-segmentation => 1 host per-switched segment Uses full-duplex Ethernet => no contention => no CSMA/CD! Uses multimode and single-mode fiber (though Broadcom recently has developed chips for UTP transmission) Only support for the 802.3 frame format, preservation of min/max frame sizes Since α larger, some minimal flow control is proposed 1-30

Logical Link Control LLC used for all IEEE 802 protocols LLC type 1, type 2, type 3, type 4,... 1-31 LLC Type 1 Unacknowledged connectionless (on 802.3) No flow or error control. Provides protocol multiplexing. Uses 3 types of protocol data units (PDUs): UI = Unnumbered informaton XID = Exchange ID = Types of operation supported, window Test = Loop back test 1-32

LLC Type 2, 3 Type 2: Acknowledged connection oriented (on 802.5) Provides flow control, error control. Uses SABME (Set asynchronous balanced mode), UA (unnumbered ack), DM (disconneced mode), DISC (disconnect) Type 3: Acknowledged connectionless Uses one-bit sequence number AC command PDUs acked by AC response PDUs 1-33 LLC Multiplexing Multiplexing allows multiple users (network layer protocols) to share a datalink Each user is identified by a service access point (SAP) DSAP SSAP Control Info 8 8 8 Size in bits Eight-bit SAP Only 256 standard values possible Even IP couldn t get a standard SAP. Use Subnetwork Access Protocol SAP (SNAP SAP) 1-34

Token Ring 4 Mb/s 16 Mb/s Delayed token release vs Immediate token release Fig 9.18 1-35 Priorities Received Received Busy Priority Reservation 3 3 1 1 Size in bits Received Priority = Pr This token/frame s priority Received reservation = Rr Someone on the ring wants to transmit at Rr To transmit a message of priority Pm, you should get a free token with Pr < Pm If free but Pr>Pm and Rr<Pm, reserve token by setting Rr=Pm If busy and Rr<Pm then reserve by setting Rr Pm If busy and Rr>Pm, wait When you transmit, set Rr=0, and busy=1. After transmission, issue a new token with Pr=Max{Pr,Pm,Rr}, Rr=Max{Rr,Pm} 1-36

FDDI Fiber Distributed Data Interface ANSI Standard for 100 Mbps over Fiber and twisted pair Timed token access Up to 500 stations on a single FDDI network Inter-node links of up to 2km on multimode fiber, 60+ km on single mode fiber, Longer SONET links, 100 m on UTP. Round-trip signal path limited to 200 km 100 km cable. 1-37 Dual-Ring of Trees Topology Server Main Frame High-End Workstation High-End Workstation Server Concentrator Workstation Personal Computer 1-38

Summary Ethernet/IEEE 802.3: CSMA/CD, Baseband, broadband Fast Ethernet Token ring/ieee 802.5 LLC Transparent and source routing bridges 1-39