IMPLEMENTATION OF IEEE MAC TRANSMITTER USING VHDL

Similar documents
International Journal of Engineering Trends and Technology (IJETT) Volume 6 Number 3- Dec 2013

Data Link Layer, Part 3 Medium Access Control. Preface

Chapter 3: Industrial Ethernet

Introduction to Ethernet and lab3.3

Data Link Layer, Part 5. Medium Access Control

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science

CSE 461: Multiple Access Networks. This Lecture

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Data and Computer Communications. Chapter 11 Local Area Network

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

CS 4453 Computer Networks Winter

Redes de Computadores. Medium Access Control

EE 122: Ethernet and

Summary of MAC protocols

Network IC Design Case Study: Ethernet MAC. National Chiao Tung University

EECS 122, Lecture 7. Kevin Fall Jean Walrand

EMAC8, EMAC8_MD Ethernet Media Access Controller

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CS 123: Lecture 12, LANs, and Ethernet. George Varghese. October 24, 2006

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Part3. Local Area Networks (LAN)

Introduction to Computer Networks. IEEE Ethernet

10/100M Ethernet-FIFO convertor

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

ECE 4450:427/527 - Computer Networks Spring 2017

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

LAN PROTOCOLS. Beulah A AP/CSE

CMPE 257: Wireless and Mobile Networking

Computer Networks and Distributed Systems

THE ETHERNET IN THE FIRST MILE CONSORTIUM. Annex 4A MAC Conformance Test Suite Version 1.0 Technical Document

FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Medium Access Protocols

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Problem Set Name the 7 OSI layers and give the corresponding functionalities for each layer.

STUDY, DESIGN AND SIMULATION OF FPGA BASED USB 2.0 DEVICE CONTROLLER

Chapter 12 Multiple Access 12.1

Access Technologies! Fabio Martignon

University of New Hampshire InterOperability Laboratory Gigabit Ethernet Consortium

Protocols for Multiaccess Networks

Design and Implementation of Wi-Fi Medium Access Control Layer for Transmitter with VHDL

Contention Protocols and Networks

The Link Layer II: Ethernet

Computer and Network Security

Performance Evaluation & Design Methodologies for Automated CRC Checking for 32 bit address Using HDLC Block

Data and Computer Communications

Interface The exit interface a packet will take when destined for a specific network.

Laboratory Finite State Machines and Serial Communication

The Link Layer and LANs. Chapter 6: Link layer and LANs

Ethernet. Networks: Ethernet 1

Controller IP for a Low Cost FPGA Based USB Device Core

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Networking Technologies and Applications

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Lesson 2-3: The IEEE x MAC Layer

CS 640 Lecture 4: 09/11/2014

Applied Networks & Security

DESIGN AND IMPLEMENTATION OF I2C SINGLE MASTER ON FPGA USING VERILOG

Medium Access Control

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Session Exam 1. EG/ES 3567 Worked Solutions. (revised)

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

CSMA/CD (Collision Detection)

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Applied Networks & Security

Chapter 6 Medium Access Control Protocols and Local Area Networks

Computer Networks Principles LAN - Ethernet

3. Data Link Layer 3-2

ECEN 5032 Data Networks Medium Access Control Sublayer

Design of Convolution Encoder and Reconfigurable Viterbi Decoder

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

Lecture 9 The Data Link Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Design and Implementation of Hamming Code on FPGA using Verilog

Distributed Queue Dual Bus

Chapter 6 Digital Data Communications Techniques

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Introduction to Ethernet. Guy Hutchison 8/30/2006

VHDL Modeling of the CSMA/CA

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

DESIGN AND IMPLEMENTATION OF A CAN / ETHERNET BRIDGE

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub

Link Layer and Ethernet

Lecture 8 The Data Link Layer part I. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Local Area Networks (LANs) SMU CSE 5344 /

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

CSE 461 Multiple Access. David Wetherall

Discontinued IP. OPB Ethernet Lite Media Access Controller (v1.01b) Introduction. Features. LogiCORE Facts

Link Layer and Ethernet

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Department of Electrical and Computer Systems Engineering

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Data Link Layer -2- Network Access

Transcription:

JOURNAL OF INFORMATION, KNOWLEDGE AND RESEARCH IN COMMUNICATION ENGINEERING ELECTRONICS AND IMPLEMENTATION OF IEEE 802.3 MAC TRANSMITTER USING VHDL 1 MR. JANAK A.PATEL, 2 PROF. PANKAJ P.PRAJAPATI 1 M.E.[Communication Systems Engineering] Student, Department Of Electronics and Communication Engineering, L. D. College of Engineering, Ahmedabad, Gujarat D. 2 Asst.Professor, Department Of Electronics & Communication Engineering, L. College of Engineering, Ahmedabad, Gujarat 1 janak_vimal1988@yahoo.com ABSTRACT: The purpose of this paper is to design and implementation a MAC Transmitter on Field Programmable Gate Arrays (FPGA) that converts 32 bit data in to 4 bit DATA for transmitter. In this paper we design the Ethernet (802.3) connection oriented LAN Medium Access Control Transmitter (MAC). It starts by describing the behavior of MAC circuit using VHISC Hardware Description Language (VHDL).. The MAC layer is works between Logical link layer and physical layer. It starts by describing the behavior and blocks of MAC Transmitter. Keywords Local Area Network (LAN), Logical Link Control(LLC), Medium Access Control(MAC), Linear feed Back Register,VHISC Hardware Description Language (VHDL). I. INTRODUCTION General Standard for the Data link layer in the OSI reference model. IEEE 802.3 Standard related to Media Access Control Layer defines the MAC layer for bus networks that use CSMA/CD. This is the basis of the Ethernet standard. The following section goes into greater detail explaining how the CSMA/CD standard functions and how it enables the network to transmit data efficiently and with very few errors. As was explained earlier, CSMA/CD allows machines to send and receive data any time it senses that the network is inactive. This method allows for a much more efficient use of the network resources and transmission medium. First it is necessary to explain how the Ethernet network is set up. A network can be made up of two or more machines connected together with a transmission medium. These nodes that are connected together form an Ethernet Segment or a Collision Domain. It is called a collision domain because all of the nodes will receive every other nodes traffic. This being the case, the transmission medium is truly shared, therefore collision prone. Machines can be on the same network, but not on the same Collision Domain. This is done through the use of bridges and switches. Each machine or node on the network has a unique MAC (Medium Access Control) address. This MAC address is permanently imprinted on the NIC (Network Interface Card) in the form of a ROM (Read Only Memory) chip. The addresses are globally unique and are assigned to the NIC manufactures in blocks of 8 or 16 million. This ensures that no two network nodes have the same address. It is this address that distinguishes a node from other machines on the network Short for Carrier Sense Multiple Access / Collision Detection, a set of rules determining how network devices respond when two devices attempt to use a data channel simultaneously (called a collision). Standard Ethernet networks use CSMA/CD to physically monitor the traffic on the line at participating stations. If no transmission is taking place at the time, the particular station can transmit. If two stations attempt to transmit simultaneously, this causes a collision, which is detected by all participating stations. After a random time interval, the stations that collided, attempt to transmit again. If another collision occurs, the time intervals from which the random waiting time is selected are increased step by step. This is known as exponential back off. The objective of resource utilization of field programming gate array(fpga) is to allocate contending to embed maximum intricate functions. This approach makes design cost effective and maximizing IEEE 802.3 MAC performance. Binary exponential back off algorithm. However effective coding style optimizes FPGA resource allocation for area and speed performance of IEEE 802.3 MAC transmitter can be optimized ISSN: 0975 6779 NOV 12 TO OCT 13 VOLUME 02, ISSUE - 02 Page 531

using linear feedback shift register, one hot finite machine (FSM) state encoding style. II. MAC INTERNAL ARCHITECTURE MAC transmitter internal architecture shown in below Fig1.The MAC internal architecture consists of major five blocks. DEFER BACKOFF TRANSMITTER FRAME ASSEMBLER CRC it receive the CARRIER SENSE as active then the timer is restarted. After 60 bit time period is elapsed,the transmitter does not monitor CARRIER SENSE for next 3 bit period and gives the signal XMIT_FRAME.Once the transmission is started it waits for XMIT_OVER or STRT_DEF to be asserted and goes to start of defer when either is asserted. IV. IMPLEMENTATION OF BACKOFF When a Transmission attempt has been terminated due to collision, it is retired by the transmitting Data Link until it is successful or attempts 16 (the original attempt plus 15 retries) have been made and all have terminated due to collisions. The scheduling of the retransmission is determined by a controlled randomization process known as Truncated Binary Exponential Back Off. After the end of enforcing a collision (Jamming), the transmitter delays before attempting to retransmit the frame. The delay is an integer multiple of slot time. The number of slot times to delay before the nth retransmission attempts is chosen as a uniformly distributed random integer r in the range 0 <= r <= 2^k Where, K=min (n, 10) If all attempts fail, this event is reported as an error. V. IMPLEMENTATION OF TRANSMITTER Fig1. Internal Architecture of MAC Transmitter III. IMPLEMENTATION OF DEFER The Defer block function providing the inter frame gap period between the two frames. It continuously deferring whenever the physical line is busy. The Defer block continues monitors the carrier sense (CS) signal provided by the physical layer and whenever the medium is busy, it defers the transmission. It provides the inter frame gap period which is 96 bit. On Receiving the STRT_XMIT from the upper layer (LLC) this block makes the X_BUSY signal active and starts the process of monitoring the channel for CARRIER SENSE is provided by the Physical layer. It monitors the channel for inter frame gap period, which is 96 bit period. The Period is split in to two different time slots 60 bit period and 36 bit period. During the 60 bit period if On Receiving STRT_XMIT active from DEFER block start transmitting 4 bits at a time. At the same time it gives signal TRANSMIT_VALID (TXDV) to the physical layer. First it transmits 7-bytes of PREAMBLE then 1 byte of SFD (Start Frame Delimiter) is transmitted and it also gives STRT signal to the Frame Assembler block and CRC block. After that it accepts 8-bit of data from Frame Assembler. Then it transmit 32-bits of CRC and gives the signal TRANSMIT OVER(XMIT_OVER) to Defer block and deasserts the signals TXDV and STRT.Since CRC block work on bytes, Frame assembler gives 8-bits of data at the output. Whereas transmitter gives nibble at the output so it reads from FRAME ASSMBLER after two clock cycles. Frame assembler also gives the output on every two clock cycles. The block also monitors the signal Collision detect (CD) provided by the physical layer. If it detects CD during transmitting PREAMBLE (sequence 1010101010) and then it transmits 4 bytes of JAM Sequence (11111111).It also asserts the signal Strt_BO and de-assert signal STRT. ISSN: 0975 6779 NOV 11 TO OCT 12 VOLUME 02, ISSUE - 01 Page 532

If collision detection anywhere else then PREAMBLE then TRANSMITTER stops transmitting and send JAM sequence.it also assert the STRT_BO and de-asserts signal STRT. VI. IMPLEMENTATION OF FRAME ASSEMBLER The Function of a frame assembler is to assemble a different component of the frame, viz.destination address, source address, length/type and data, and supply this to the transmitter as well as the CRC block. Hence, the assembler assembles all the fields over which FCS is determined. The destination address is the MAC address of the machine to which the particular frame is to be delivered. Each NIC (Network Interface Card) has a unique MAC address. It is this address that is part of the destination address field, which is a 6 byte or 48-bit address. The function of a frame assembler is to construct the 802.3 frame from the following 1. Destination address stored in first 6 bytes of buffer. 2. Source address that is hardwired onto the MAC 3. Length stored in the lower word of the second location of buffer 4. Data bytes stored in the subsequent buffer location 5. Pad bytes if length is less than 46 bytes to make up a total of 46 bytes of data and Hence the frame Assembler is tested as follows :- 1. The buffer is filled with some destination address and a length. A source address is also stored in its register. 2. The subsequent buffer location are filled with randomly generated data vectors 3. The frame assembler is activated by the STRT signal. 4. The byte output of the frame assembler is stored into an output file through textio 5. The frame generated is analyzed to isolate its individual components viz. destination Address, Source Address, Length data + Pad. Each field is verified for correct operation. The total length of the data must match the length specified in the length field for length between 46 and 1500,where as it should be 46 bytes including data and padding for length field or less than 46. if the length specified is greater than 1500 the frame Assembler should generate an error condition and exit. The Frame Assembler is tested for the following length Conditions Length=0, Length<46, Length=46, Length>46,and <1500 Length =1500, Length <1500. VII. CRC GENERATOR A Cyclic Redundancy Check (CRC) is used by the transmit and receive algorithms to generate a CRC value for the FCS field. The Frame Check Sequence (FCS) field contains a 4-octet CRC value. This value is computed as a function of the contents of the Source address, Destination Address, Length, LLC Data and PAD. The encoding is defined by the following generate polynomial [1]. G(x)=X32+X26+X23+X22+X16+X12+X11+X10+ X8+X7+X5+X4+X2+X+1 [1] Mathematically, The CRC value corresponding to a given frame is defined by the following procedure. The First 32 bits of the frame are complemented. The N bits of the frame are then considered to be the coefficients of a polynomial M(X) of a degree (n-1).(the first bit of a destination address field corresponds to the X(n-1) term and the last bit of data field correspond to the X0 term.) M(X) is multiplied by X32and divided by G(X), producing a remainder R(X) of degree <31. The co-efficient of R(x) are considered to be a 32 bit sequence. The bit sequence is complemented and the result is the CRC. The 32 bits of the CRC value are placed in the FCS field so that the X31 term is the left most bit of the first octet, and the X0 term is the Right most bit of the last octet. The bits of the CRC are thus transmitted from MSB to LSB. The CRC block performs its operation on byte data. It is implemented using a 32 bit register and gates. As long as STRT and EN_CRC are asserted, the CRC block operates on the incoming data. The content of the CRC register after all the data bytes ISSN: 0975 6779 NOV 11 TO OCT 12 VOLUME 02, ISSUE - 01 Page 533

have been input to it is the CRC. This CRC is transmitted in the appropriate order as the Frame Check Sequence. At the receiver, when the FCS block has processed this CRC. VIII. MAC TRANSMITTER TOP MODULE Fig2.Simulation result of the MAC Transmitter Top module IX. SYNTHESIS RESULT Synthesis is to transform between two different design views from a behavioral specification of a design entity into a structural description. A careful optimization of synthesis is of the utmost importance since this process attempts to implement a combination of library cells that meets the functional, speed, area, and power requirements of a design and transforms a design into a technology-specific circuit based on the attributes and constraints a designer places on the design. From the Synthesis report I have synthesis report for proposed design implementation. I have concluded that this project can be implemented with Sparten 3E. Fig 3 shows the RTL view of MAC transmitter on clicking this block diagram it gives internal block division of the MAC transmitter. Fig3.Top level synthesis module The Fig5. shows the top module of the MAC transmitter with the all input out pin. In RTL (Register Transfer Level) synthesis process, I get a schematic representation of my synthesized source file. The Fig4. shows the internal block of the top MAC transmitter module of the MAC transmitter. This schematic shows a representation of the preoptimized design in terms of generic symbols, such as adders, multipliers, counters, AND gates, and OR gates, that are independent of the Fig 4. Internal Block of the TOP MAC Tx targeted Xilinx devices. Viewing this schematic may help for discovering design issues early in the design process. ISSN: 0975 6779 NOV 11 TO OCT 12 VOLUME 02, ISSUE - 01 Page 534

Using an EDA tool for synthesis, it can be directly translated to an equivalent hardware implementation file for an ASIC or an FPGA. X. CONCLUSION The VHDL Implementation of MAC gives the improved digital design process, especially for FPGA design. A hardware description language allows a digital system to be designed and debugged at a higher level before conversion to the gate and flip-flop level. One of the most popular hardware description languages is VHISC hardware description language (VHDL).It is used to describe and simulate the operation of variety IEEE 802.3 systems. IEEE journal on selected areas in communications, vol.18.no.september 2000,pp1774-1778. 4. P.M.Soni and a Chockalingam IEEE analysis of link layer backoff schemes on Point to-point Markov fading links,ieee Transaction on communication, vol.51,no.1, January 2003,pp 29-31. 5. IEEE 802.3 Cyclic Redundancy Check, Xilinx, XAPP209 (v1.0) march 23, Application note: vertex series and vertex II family, 2001, Author by Chriss Borelli 6. Kenneth J.Christensen A simulation study of enhanced arbitration methods for improving Ethernet performance computer communications,21(1998)24-36, ELSEVIER. This paper has covered and discussed a software design, and implementation of a basic IEEE 802.3 (MAC Transmitter) system. The speed of data transmission is very high & it gives proper CRC bit for receiving correct data. The simulated waveforms give the reliability of the VHDL implementation to describe the characteristics and the architecture of the designed MAC with embedded BIST. The simulated waveforms also have shown the observer how long the test result can be achieved by using the Built- In-Self-Test technique (BIST) is completed at 39.2ms using 25 MHz clock speed transmitting at 100 Mbps. Even though it seems not to be as fast as it should be when BIST is implemented (the receiver needs to wait the signal from the transmitter), the MAC Transmitter module still takes advantage of the 100% fault coverage. This is the most important thing that should not be left out by any designer to ensure the reliability of their design. The next target for this research is to verify the RTL, implement and download it on Xilinx s FPGA chip. REFRENCES 1.Puran Gour, Design and Optimization of Medium Access Control Protocol of IEEE 802.3 Transmitter with VHDLǁ - International Journal of Computer Applications (0975 8887) Volume 13 No.1, January 2011, pp 8-12. 2. Dr. M.S. Sutaone Performance Evaluation of VHDL Coding Techniques for Optimized Implementation of IEEE 802.3 IEEE transaction on communication, pp- 287-293,Jan 12, 2008 3. Fedrico Cali, Marco Conti, and Enrico Gregori IEEE 802.11 protocol: design and performance evaluation of an adaptive Back off mechanism ISSN: 0975 6779 NOV 11 TO OCT 12 VOLUME 02, ISSUE - 01 Page 535