CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

Similar documents
High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

EE 122: Ethernet and

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

COS 140: Foundations of Computer Science

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Data Link Layer, Part 5. Medium Access Control

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

COS 140: Foundations of Computer Science

Redes de Computadores. Medium Access Control

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

CSE 461: Multiple Access Networks. This Lecture

Data Link Layer, Part 3 Medium Access Control. Preface

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Links. CS125 - mylinks 1 1/22/14

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Protocols for Multiaccess Networks

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Chapter 12 Multiple Access 12.1

Link Layer and Ethernet

Link Layer and Ethernet

CS 4453 Computer Networks Winter

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Summary of MAC protocols

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Links. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

ECE 4450:427/527 - Computer Networks Spring 2017

The Link Layer and LANs. Chapter 6: Link layer and LANs

Medium Access Control

Multiple Access Links and Protocols

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

LAN PROTOCOLS. Beulah A AP/CSE

Medium Access Protocols

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Chapter 5 Link Layer and LANs

Multiple Access Protocols

Link Layer: Retransmissions

CS 455/555 Intro to Networks and Communications. Link Layer

CMPE 257: Wireless and Mobile Networking

ECEN 5032 Data Networks Medium Access Control Sublayer

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Contention Protocols and Networks

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Data and Computer Communications. Chapter 11 Local Area Network

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Data Link Layer -2- Network Access

Networking Technologies and Applications

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

STEVEN R. BAGLEY PACKETS

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

CSE 461 Multiple Access. David Wetherall

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Your favorite blog : (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY

Data Link Layer -2- Network Access

Chapter 8 LAN Topologies

CSC 4900 Computer Networks: The Link Layer

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

The Link Layer II: Ethernet

Data and Computer Communications

Link Layer and LANs. Our Goals. Link Layer

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

Chapter 5 Link Layer and LANs

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Outline: Connecting Many Computers

MULTIPLE ACCESS PROTOCOLS 2. 1

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

Goals of Today s Lecture. Adaptors Communicating

Master Course Computer Networks IN2097

Housekeeping. Fall /5 CptS/EE 555 1

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Medium Access Control Sublayer

Data Link Layer: Multi Access Protocols

Master Course Computer Networks IN2097

Computer Networks Principles LAN - Ethernet

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Computer and Network Security

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

COMP/ELEC 429/556 Introduction to Computer Networks

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Chapter 4: The Medium Access Layer

CS 640 Lecture 4: 09/11/2014

Computer Networks. Medium Access Sublayer (Part I)

Chapter 5: Link layer

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Reliable Transmission

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Today. Last Time. Motivation. CAN Bus. More about CAN. What is CAN?

Ethernet. Introduction. CSE 3213 Fall 2011

Transcription:

CS 123: Lecture 12, LANs, and Ethernet George Varghese October 24, 2006

Selective Reject Modulus failure Example w = 2, Max = 3 0 0 1 3 0 A(1) A(2) 1 0 retransmit A(1) A(2) buffer Case 1 Case 2 reject 1

Design Lessons Prefer correctness not to depend on timer settings. Don t add complexity till its justified. Stop and wait to sel reject. Design Simple Protocols first and optimize later. Consider dynamic versions of static protocols. Dynamic windows. Need to design protocols to recover from faults. Use restart method. Impossibility Results teach us what we have to change to do our jobs. 2

Course Strategy Build concepts systematically: layer upon layer, sublayer upon sublayer starting from bottom. Learn some useful, general ideas: Clock recovery, synchronization, sublayering, coding, Shannon Limits, Hamming Distance, latency versus throughput, state view and invariants. Question existing mechanisms: Why CRC-16, why mod 2 division, why is HDLC flag 01111110? Learn to Extend and Create: Creating stuffing schemes, new error detection schemes, new error recovery schemes, new transports and routing schemes later. 3

A Rose by any other Name Inherently sequential. Link shared among multiple senders. A.K.A. Multiaccess links because there are multiple nodes that may simultaneously access link. Broadcast links because every transmission can be heard by all other stations. Local Area Networks or LANs because the geographical area serviced by a LAN is local and small from 1-10 Kms, covering an office, a building, or at most a campus. 4

WHY LANS Connect up all computers in a building, office, campus. 200-1000 users. Saves wiring costs to share one wire. Provides high bandwidth and low error rates for local group of users. Worth it because most high-bandwidth distributed computing (e.g., file servers etc.) has acess locality. Time division multiplexing not a good idea when user traffic is bursty as data is. Bursty = high peak/average ratio. Each user gets access to entire LAN bandwidth when other users are idle. As more users are added, they share the bandwidth 5

Statistical versus Strict Multiplexing Strict multiplexing: TDM or FDM where a user is given a fixed allocation regardless of whether the user has data to send or not. Bursty: traffic has a high peak/average ratio. Strict gives each user B/N, where N is the number of possible sources; stat multiplexing attempts to give each user, B/x, where x is the number of busy users. N large (100-1000) while x is small (1-10). Suppose 100 users each transfer a 125 kbyte file every 2 hours. At 10 Mbps, a 125 kbyte file takes 0.1 seconds to transmit. At 0.1 Mbps, file takes 10 seconds to transfer. 6

ALOHA UNSLOTTED ALOHA 2 T SLOTTED ALOHA T Predecessor of Ethernet. Multiple ground stations in various parts of Hawai. Couldn t do collision detection or carrier sense, but did have a form of randomized backoff. More inefficient: but similar problems arise in mobile computing. Slotted Aloha reduces vulnerable period by half but requires a common clock reference. 7

In transmission Collision Detect and Semi-reliability 1500 byte frame involved in a collision. Ethernet aborts transmission after 64 bytes. Aloha will send the entire 1500 bytes and detect when ack is not received. Better for large frames, and large frame sizes allow efficiency. No detection of frame corruption. (1 in million). However, collisions are frequent. Semi-reliable: detect collisions and retransmit in hardware. 8

ETHERNET Three mechanisms: : Carrier sense and deference: No point transmitting when someone else is speaking Collision Detection: No point continuing to send a large frame (up to 1500 bytes) when after 64 bytes you can detect a collision. Exponential Backoff: Collisions very frequent, so important to retransmit. Random backoff avoids synchronized collisions. Exponentially growing backoff attempts to dynamically adjust to number of colliders. Fixed backoff would be wasteful or insufficient. Other details: Slot time = 2T, T = end-to-end delay = 51.2 usec = 64 bit times = maximum delay to detect a collision. Minimum packet size of 64 bytes to avoid possibility of finishing transmission before collision is detected. Add pad if data is too small. Jam: transmit small number of bits after you detect a collision to ensure that other transmitters also detect collision. Use Manchester with average DC level per bit. Collision detection by detecting increased voltage level. 9

Dynamic Backoff Consider 2 colliders. One should wait 1 slot and the other 0. Can approximate by tossing a coin. Consider 16 colliders. Ordinary coin-tossing does not work. Pick random numbers from 1 to 16. static scheme either does not work for a large number of colliders or is inefficient for a small number. Binary exponential backoff. 10

Why Min Packet Sizes A Short Frame Clean B COLLISION jam to ensure "width" of collision 11

Ethernet Header 01010111 Dest Source Length Data Pad CRC preamble (6) (6) (2) Total Frame length 64<=L<=1500 LLC sublayer 12

Ethernet Implementation Details Limited distance (2.5 km). 500 m wires. 4 repeaters. Thin wire, Thick wire Repeaters: important device, reads in a bit and writes out a bit on other side, boosting signal strength. Physical Topology is a star or tree. 13

Cost of statistical muxing in Ethernet If distance goes up by a factor of 10 or speed, then what happens to min packet size? Why is it wasteful? New 100 Mbps Ethernet proposal, has only 200 m extent. 14

Concepts Statistical Multiplexing Importance of Pipe size in determining efficiency. Logical versus physical topology 15