Data and Computer Communications

Similar documents
Lecture 05 Chapter 16 High Speed LANs

Ethernet. Introduction. CSE 3213 Fall 2011

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

Data and Computer Communications. Chapter 11 Local Area Network

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

LAN Systems. Bus topology LANs

Contention Protocols and Networks

Fibre Channel: This standard provides a low-cost, easily scalable approach to achieving very high data rates in local areas.

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

LAN PROTOCOLS. Beulah A AP/CSE

Data Link Layer, Part 3 Medium Access Control. Preface

COS 140: Foundations of Computer Science

Networking Technologies and Applications

Data Link Layer -2- Network Access

Data Link Layer, Part 5. Medium Access Control

Data Link Layer -2- Network Access

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Introduction. High Speed LANs. Emergence of High-Speed LANs. Characteristics of High Speed LANS. Text ch. 6, High-Speed Networks and

COS 140: Foundations of Computer Science

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

LAN Systems. Bus topology LANs

Ethernet Technologies

HIGH-SPEED LANS CHAPTER The Emergence of High-Speed LANS Ethernet Fibre Channel Recommended Reading and Web Sites

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Multiple Access Protocols

Medium Access Control Sublayer

CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS

Ethernet. Computer Networks. Lecture 4.

LAN Protocols. Required reading: Forouzan 13.1 to 13.5 Garcia 6.7, 6.8. CSE 3213, Fall 2015 Instructor: N. Vlajic

Chapter 4. The Medium Access Control Sublayer

Chapter 10: Local Area Networks

CSE 461: Multiple Access Networks. This Lecture

Local Area Networks (LANs) SMU CSE 5344 /

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Local Area Network Overview

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Part3. Local Area Networks (LAN)

Networks Homework # 2

ET4254 Communications and Networking 1

Communication (III) Kai Huang

EE 122: Ethernet and

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

10- and 100-Mbps Ethernet

! High Data Rates (0.1 to 1000 Mbps)! Short Distances (0.1 to 25 km) ! Low Error Rate (10 to 10 ) Local Area Networks

Lecture 8: Switched Ethernet and Collision Domains

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

Access Technologies! Fabio Martignon

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Medium Access Control. CSCI370 Lecture 5 Michael Hutt New York Institute of Technology

IEEE 802 LANs SECTION C

CSMA/CD (Collision Detection)

Redes de Computadores. Medium Access Control

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

Outline: Connecting Many Computers

IEEE standards for local area networks

Lecture 6: Example LAN: Ethernet

Protocols for Multiaccess Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

Internet Architecture and Protocol

COMPUTER NETWORKS - Local area networks

Local area networks. Copyright

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Medium Access Control Sublayer Chapter 4

Chapter 12 Multiple Access 12.1

Ethernet. Networks: Ethernet 1

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Introduction to Computer Networks. IEEE Ethernet

Link Layer and Ethernet

Link Layer and Ethernet

Chapter 15 Local Area Network Overview

ECE 4450:427/527 - Computer Networks Spring 2017

ECEN 5032 Data Networks Medium Access Control Sublayer

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Random Assignment Protocols

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Media Access Control (MAC) Sub-layer and Ethernet

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

The Link Layer and LANs. Chapter 6: Link layer and LANs

Direct Link Communication II: Wired Media. Multi-Access Communication

Review For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Chapter 4: The Medium Access Layer

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Design Technologies. Lecture 17: Prof. Shervin Shirmohammadi CEG

Chapter 5 Link Layer and LANs

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs

Transcription:

Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings

Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as essential to organizations for client/server computing now have requirements for centralized server farms power workgroups high-speed local backbone Chap16:2

Medium Access Methods In a LAN, all stations are connected to a shared transmission medium Simultaneous attempts to access the medium by more than one station is possible Similar to a meeting Collision Medium access control (MAC) Defines the procedure a station should follow when it needs to send a frame Chap16:3

Random Access In random access or contention methods, no station is superior to another A station can transmit when it desires Following the predefined procedure What does the name implies? There may be collision What should a MAC protocol do? Chap16:4

ALOHA developed for packet radio nets when station has frame, it sends then listens for a bit over max round trip time if receive ACK then fine if not, retransmit if no ACK after repeated transmissions, give up uses a frame check sequence (as in HDLC) frame may be damaged by noise or by another station transmitting at the same time (collision) any overlap of frames causes collision max utilization 18% Chap16:5

Vulnerable Time for Pure ALOHA Protocol Chap16:6

Slotted ALOHA time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism) transmission begins at slot boundary frames either miss or overlap totally max utilization 37% both have poor utilization fail to use fact that propagation time is much less than frame transmission time Chap16:7

Vulnerable Time for Slotted ALOHA Protocol Chap16:8

CSMA stations soon know transmission has started so first listen for clear medium (carrier sense) if medium idle, transmit if two stations start at the same instant, collision wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame max utilization depends on propagation time (medium length) and frame length Chap16:9

Nonpersistent CSMA Nonpersistent CSMA rules: 1. if medium idle, transmit 2. if medium busy, wait amount of time drawn from probability distribution (retransmission delay) & retry random delays reduces probability of collisions capacity is wasted because medium will remain idle following end of transmission nonpersistent stations are deferential Chap16:10

Nonpersistent Method Chap16:11

1-persistent CSMA 1-persistent CSMA avoids idle channel time 1-persistent CSMA rules: 1. if medium idle, transmit; 2. if medium busy, listen until idle; then transmit immediately 1-persistent stations are selfish if two or more stations waiting, a collision is guaranteed Chap16:12

1-Persistent Approach Chap16:13

P-persistent CSMA a compromise to try and reduce collisions and idle time p-persistent CSMA rules: 1. if medium idle, transmit with probability p, and delay one time unit with probability (1 p) 2. if medium busy, listen until idle and repeat step 1 3. if transmission is delayed one time unit, repeat step 1 issue of choosing effective value of p to avoid instability under heavy load Chap16:14

Value of p? have n stations waiting to send at end of tx, expected no of stations is np if np>1 on average there will be a collision repeated tx attempts mean collisions likely eventually when all stations trying to send have continuous collisions hence zero throughput thus want np<1 for expected peaks of n if heavy load expected, p small but smaller p means stations wait longer Chap16:15

Ethernet (CSMA/CD) most widely used LAN standard developed by Xerox - original Ethernet IEEE 802.3 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) random / contention access to media Chap16:16

CSMA/CD Description with CSMA, collision occupies medium for duration of transmission better if stations listen whilst transmitting CSMA/CD rules: 1. if medium idle, transmit 2. if busy, listen for idle, then transmit 3. if collision detected, jam and then cease transmission 4. after jam, wait random time then retry Chap16:17

CSMA/CD Procedure Chap16:18

CSMA/CD Operation Chap16:19

Which Persistence Algorithm? IEEE 802.3 uses 1-persistent both nonpersistent and p-persistent have performance problems 1-persistent seems more unstable than p- persistent because of greed of the stations but wasted time due to collisions is short with random backoff unlikely to collide on next attempt to send Chap16:20

Binary Exponential Backoff for backoff stability, IEEE 802.3 and Ethernet both use binary exponential backoff backoff-time=r slot-time n: no. of experienced successive collisions k: backoff factor = min (n, 10) r: a random integer between 0 and 2 k -1 stations repeatedly resend when collide on first 10 attempts, mean random delay doubled value then remains same for 6 further attempts after 16 unsuccessful attempts, station gives up and reports error Chap16:21

Collision Detection on baseband bus collision produces higher signal voltage collision detected if cable signal greater than single station signal signal is attenuated over distance limit to 500m (10Base5) or 200m (10Base2) on twisted pair (star-topology) activity on more than one port is collision use special collision presence signal Chap16:22

IEEE 802.3 Frame Format Chap16:23

10Mbps Specification (Ethernet) Transmission medium Signaling technique 10BASE5 10BASE2 10BASE-T 10BASE-FP Coaxial cable (50 ohm) Baseband (Manchester) Coaxial cable (50 ohm) Baseband (Manchester) Unshielded twisted pair Baseband (Manchester) Topology Bus Bus Star Star Maximum segment length (m) 500 185 100 500 Nodes per segment 100 30 33 Cable diameter (mm) 850-nm optical fiber pair Manchester/on-off 10 5 0.4 to 0.6 62.5/125 µm Chap16:24

Ethernet Address in Hexadecimal Notation Chap16:25

Globally and Locally Unique Addresses Global unique address The first 3 bytes are the vendor block code The second 3 bytes are the vendor specific identifier Locally unique address The addresses of two NICs may be purchased from different vendors, the administrator should ensure the uniqueness Chap16:26

Modifications of Fast-Ethernet For a given minimum-length frame, the extent of a network scales inversely with data rate. For 100 Mbps Fast Ethernet, a choice had to be made to do one or more of the following: Increase the minimum frame length so that large networks (with multiple repeaters) could be supported. Leave the minimum frame as is, and decrease the extent of the network accordingly. Change the CSMA/CD algorithm to avoid the conflict Chap16:27

Modifications of Fast-Ethernet Fast Ethernet uses The same 512-bit minimum frame. Decrease the network extent to the order of 200m, using twisted-pair cabling. No change to the CSMA/CD algorithm. Chap16:28

100Mbps Fast Ethernet Transmission medium Signaling technique 100BASE-TX 100BASE-FX 100BASE-T4 2 pair, STP 2 pair, Category 5 UTP 2 optical fibers 4 pair, Category 3, 4, or 5 UTP MLT-3 MLT-3 4B5B, NRZI 8B6T, NRZ Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps Maximum segment length 100 m 100 m 100 m 100 m Network span 200 m 200 m 400 m 200 m Chap16:29

100BASE-X uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link encoding scheme same as FDDI 4B/5B-NRZI two physical medium specifications 100BASE-TX uses two pairs of twisted-pair cable for tx & rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used 100BASE-FX uses two optical fiber cables for tx & rx convert 4B/5B-NRZI code group into optical signals Chap16:30

100BASE-T4 100-Mbps over lower-quality Cat 3 UTP takes advantage of large installed base does not transmit continuous signal between packets useful in battery-powered applications can not get 100 Mbps on single twisted pair so data stream split into three separate streams four twisted pairs used data transmitted and received using three pairs two pairs configured for bidirectional transmission use ternary signaling scheme (8B6T) Chap16:31

100BASE-T Options Chap16:32

Full Duplex Operation traditional Ethernet half duplex using full-duplex, station can transmit and receive simultaneously 100-Mbps Ethernet in full-duplex mode, giving a theoretical transfer rate of 200 Mbps stations must have full-duplex adapter cards and must use switching hub each station constitutes separate collision domain CSMA/CD algorithm no longer needed 802.3 MAC frame format used Chap16:33

Mixed Configurations Fast Ethernet supports mixture of existing 10- Mbps LANs and newer 100-Mbps LANs supporting older and newer technologies e.g. 100-Mbps backbone LAN supports 10-Mbps hubs stations attach to 10-Mbps hubs using 10BASE-T hubs connected to switching hubs using 100BASE-T high-capacity workstations and servers attach directly to 10/100 switches switches connected to 100-Mbps hubs use 100-Mbps links 100-Mbps hubs provide building backbone connected to router providing connection to WAN Chap16:34

Modifications of Gigabit Ethernet Fast Ethernet uses The same 512-bit minimum frame. Decrease the network extent to the order of 200m, using twisted-pair cabling. No change to the CSMA/CD algorithm. For Gigabit Ethernet, network extent is only about 20m!!, if the same approach is used. Chap16:35

Solutions for Gigabit Ethernet Keep the 512-bit minimum frame. Modify the MAC algorithm (Carrier Extension) to artificially extend the frame as seen on the physical channel so that a short frame appears longer. This supports the same wiring closet topology (100m) without increasing the minimum length of the data portion of the frame. Provide an optional performance enhancement for senders of short frames (frame bursting). Chap16:36

Carrier Extended Frame Format P7-26 fig7-13 Chap16:37

Frame Bursting Chap16:38

Gigabit Ethernet Configuration Chap16:39

Gigabit Ethernet - Differences carrier extension at least 4096 bit-times long (512 for 10/100) frame bursting not needed if using a switched hub to provide dedicated media access Chap16:40

Gigabit Ethernet Physical Chap16:41

10Gbps Ethernet growing interest in 10Gbps Ethernet for high-speed backbone use with future wider deployment alternative to ATM and other WAN technologies uniform technology for LAN, MAN, or WAN advantages of 10Gbps Ethernet no expensive, bandwidth-consuming conversion between Ethernet packets and ATM cells IP and Ethernet together offers QoS and traffic policing approach ATM have a variety of standard optical interfaces Chap16:42

10Gbps Ethernet Configurations Chap16:43

10Gbps Ethernet Options Chap16:44

Summary High speed LANs emergence Ethernet technologies CSMA & CSMA/CD media access 10Mbps ethernet 100Mbps ethernet 1Gbps ethernet 10Gbps ethernet Chap16:45