Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...

Similar documents
Data always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send

CSE 461: Multiple Access Networks. This Lecture

Unit II. Part A (2 Marks)

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 5. Medium Access Control

LAN PROTOCOLS. Beulah A AP/CSE

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

CARRIER SENSE MULTIPLE ACCESS (CSMA):

EE 122: Ethernet and

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Direct Link Networks (II)

Housekeeping. Fall /5 CptS/EE 555 1

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Medium Access Protocols

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CS 640 Lecture 4: 09/11/2014

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Lecture 4b. Local Area Networks and Bridges

Outline: Connecting Many Computers

EECS 122, Lecture 7. Kevin Fall Jean Walrand

Reliable Transmission

Summary of MAC protocols

Link Layer and Ethernet

Link Layer and Ethernet

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Computer and Network Security

ECE 4450:427/527 - Computer Networks Spring 2017

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

Media Access Control (MAC) Sub-layer and Ethernet

Direct Link Communication II: Wired Media. Multi-Access Communication

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Chapter 16 Networking

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

Contention Protocols and Networks

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Multiple Access Channels

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Lecture 7: Ethernet Hardware Addressing and Frame Format. Dr. Mohammed Hawa. Electrical Engineering Department, University of Jordan.

CSE/EE 461 Section 2

Lecture 6: Example LAN: Ethernet

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

IEEE 802 LANs SECTION C

Shared Access Networks

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Internet Architecture and Protocol

Multiple Access Protocols

CSE/EE 461 Wireless and Contention-Free Protocols

Local Area Networks (LANs) SMU CSE 5344 /

The Link Layer II: Ethernet

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

Introduction to Computer Networks. IEEE Ethernet

Part3. Local Area Networks (LAN)

Link Layer (L2) Review

Computer Networks Principles LAN - Ethernet

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

CSCI Spring Final Exam Solution

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Medium Access Control

Computer Networking Lecture 5 Data link Layer Access Control. Based on slides by Peter Steenkiste Copyright, Carnegie Mellon

Introduction to Networks and the Internet

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CMPE 257: Wireless and Mobile Networking

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks

Midterm Exam CSCE 232: Computer Networks Fall Instructions:

Direct Link Communication II: Wired Media. Multi-Access Communication

Data Link Layer: Collisions

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

2. LAN Topologies Gilbert Ndjatou Page 1

CMPE 257: Wireless and Mobile Networking

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

Chapter 12 Multiple Access 12.1

Adaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols

The Link Layer and LANs. Chapter 6: Link layer and LANs

Lecture 9: Bridging & Switching"

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Layer 2 functionality bridging and switching

Network Topology. By Dr. Piya Techateerawat. Bus Topology Ring Topology Star Topology Fully Connected Topology. Combined Topology

Improved Coexistence in the HS Standard

Networking Technologies and Applications

1. Data Link Layer Protocols

Chapter 3: Industrial Ethernet

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Chapter 6 Medium Access Control Protocols and Local Area Networks

The Medium Access Sublayer

Communication Networks

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Transcription:

Media Access Protocols Kameswari Chebrolu Dept. of Electrical Engineering, IIT Kanpur Shared Access Networks More than two nodes are attached to the same physical medium Normally span a small geographical area Referred to as Local Area networks Examples: Ethernet, Token Ring, FDDI, 02.11 Problem: How to resolve contention for the shared channel amongst several nodes? Solution: Media Access Protocols Ethernet (02.3) Implemented on a coaxial cable of up to 500m Bandwidth: 10Mbps, 100Mbps, 1Gbps connects to an Ethernet segment by means of a tap Tap consists of a transceiver which Ethernet cont... T r a n s c e i v e r E t h e r n e t c a b l e A d a p t o r Detects when the line is idle, drives transmitted signal from host, Receives incoming signals Ethernet logic implemented in the adaptor Any signal placed on Ethernet is broadcast over the entire network H o s t

Ethernet Repeater Frame Format Preamble: 64 bit sequence of alternating 0's and 1's Destination/Source Address: 4 bit ess used to identify hosts Example: 00:0F:1F:D2:00:BB Type: Identifies which of the higher layer protocols this frame should be delivered Repeater 64 4 4 16 32 Preamble Dest Src Type Body CRC CSMA/CD Access Protocol CSMA/CD: Carrier Sense Multiple Access with Collision Detection Carrier Sense means All nodes can distinguish between an idle and busy link Collision Detect means A node listens as it transmits It can detect interference from other node transmissions Under heavy loads, utilization is only 30% Maximum hosts limited to 1024 Receiver Side Algorithm Each frame transmitted on the Ethernet is received by every adaptor connected to it An adaptors accepts only those frames essed to its own ess essed to the broadcast ess essed to multicast ess it belongs to all frames, if placed in promiscuous mode (special mode)

Transmitter Side If the line is idle, send immediately If the line is busy, wait for it to become idle and transmit immediately (1-persistent protocol) If collision Jam for 32 bits and stop transmission To detect collisions, minimum frame size is set to 512 bits Wait some time and try again (exponential back off) 1 st time: 0, 51.2 us 2 nd time: 0, 51.2, 102.4 or 153.6 us n th time: waits k * 51.2us, k random between 0 and 2 n - 1 Report a transmission error after 16 attempts Token Rings (02.5, FDDI) A set of hosts connected in a ring Data flows in a particular direction around the ring Each node receives from upstream neighbor and forward to downstream neighbor Like in Ethernet, the ring is viewed as a single shared medium Bandwidths: 4Mbps, 16Mbps or 100Mbps 250 stations per Ring Token Ring Network Multistation Access Units From previous T To next

Basic Idea A special bit pattern (24 bit token) rotates round the ring A host must capture token before transmitting a packet As the packet flows past each node on the ring Only the intended receiver copies the packet into its buffer Only the sending host can remove the packet from the ring After finishing transmission, sending host release token back into the ring Immediate release Delayed release s get a Round-Robin service Start delimiter Frame Format Access control: Includes frame priority Frame Control: Identifies higher layer protocol Address fields: Similar to Ethernet, 4 bits long Frame Status Byte: Provides reliability info. A bit is set if the intended recipient sees the frame C bit is set if the intended recipient copies the frame into its buffer successfully Access control Frame control 4 4 Variable 32 Dest Src Body Checksum End delimiter Frame status Token Ring Maintenance A host acts as a Monitor to ensure the health of the ring A Monitor periodically transmits a special control message A Monitor is elected by transmitting a claim token Contention is broken by some well defined rule like highest ess wins Role of the Monitor Ensures that there is always a token in the ring A token can vanish due to bit errors, crash of a machine holding the token Monitor employs a Timer and watches for a passing token If timer expires before the token is seen, it creates a new one Timer: NumStations * TokenHoldingTime + RingLatency Checks for corrupted or orphaned frames They are detected using the monitor bit in the header At transmission, this bit is set to 0, first time monitor sees the packet, this bit is set to 1 Monitor drains off the ring any packet with monitor bit set to 1

Summary Looked at how to mediate access to a shared link Two different protocols: Ethernet CSMA/CD and token ring Protocols are distributed in nature Moving on to How to make two hosts talk when they are not directly connected?