4. MAC protocols and LANs

Size: px
Start display at page:

Download "4. MAC protocols and LANs"

Transcription

1 4. MAC protocols and LANs 1

2 Outline MAC protocols and sublayers, LANs: Ethernet, Token ring and Token bus Logic Link Control (LLC) sublayer protocol Bridges: transparent (spanning tree), source routing and remote bridges 2

3 Multiple Access Control (MAC) Protocols There are two categories of networks: One uses point to point connections: computer dial-up links, using SLIP, PPP, HDLC The other uses broadcast channels: more than one stations share the same channel, such as LANs using random access or token MAC protocols is used to determine which station goes next to access the shared channels 3

4 Random Access: Aloha and Slotted Aloha User transmit whenever they have data Listen to the channel to see if the frame is OK Contention system 4

5 Channel efficiency Throughput S = GP 0 Poisson distribution: P[k] = G k e -G / k! In 2 frame interval, the number of frames generated is 2G, thus P 0 = e -2G => S = G e -2G Max. throughput S = 1/2e, when G=1/2 For slotted Aloha the vulnerable period is 1 frame period (halved), thus P 0 = e -G => S = G e -G 5

6 Carrier Sense Multiple Access (CSMA) 1-persistent: the station listens before sending. if the channel is busy, it waits until it idle. Transmit when the channel is idle. if collision, the station waits a random amount of time and start all over again non-persistent: If busy, the station does not continually sense. Instead, waiting for a random period, then repeating the algorithm p-persistent: It applies to slotted channel. If it is idle, it transmits with probability of p. 6

7 CSMA/CD Further improvement than persistent and non-persistent over Aloha, by aborting transmission as soon as stations detect a collision Contention period is 2τ where τ is propagation delay Example: for a 1 km cable, the τ is about 5 µseconds Ethernet is one of this version No MAC-sublayer protocol guarantees reliable delivery 7

8 Collision free protocols A bit map protocol: it is also called reservation protocol. Each contention period consists of exactly N slots for N stations. Efficiency = d/(d+1) Binary countdown: each station has a binary address, start to broadcast with the high order bit. It stops as soon as a high order position 0 is overwritten with a 1. Efficiency = d/(d+log 2 N) 8

9 Limited contention protocols 1/e = Two important performance measures: delay at low load and channel efficiency at high load. At low load, contention is preferable due to low delay. At high load, reservation is preferable due to high efficiency. The adaptive tree walk protocol: dynamically allocate time slots. If a collision occurs during slot 1, the entire tree is searched, depth first to allocate all the ready stations. 9

10 IEEE and Ethernet Bus Topology Whole family of 1-persistent CSMA/CD From 1-10 Mbit/s on different media Switched Ethernet 10

11 Ethernet MAC Frame For a 10-Mbit/s LAN Max meters and 4 repeaters (500 m/segment) Min. allowed frame must take 51.2 µ seconds (corresponds to 64 bytes) If operating at 1 Gbit/s Max. 250 meters, and Min. frame size 640 bytes 11

12 IEEE Token Ring Ring topology, suitable for real time Token holding time is 10 ms Speed 1 and 4 Mbit/s Delimiter, access control, frame control sources and destination address, checksum are the same as the

13 IEEE Token Bus Logical ring, suitable for real time For priorities: 0, 2, 4, 6 Speed 1, 5, and 10 Mbit/s Preamble, delimiter, control, Sources and destination address, checksum are the same as the

14 IEEE Logical link control Hide difference between the various 802 networks by providing a single format and interface to the network layer Based on HDLC, provide 3 service options as the link layer Error control using acknowledgment Flow control using a slide window All 802 LANs and MAN offer best-efforts service 14

15 Bridges Why using bridges? 1. Different department have different LANs initially; 2. geographical separated; 3. Accommodate the load; 4. Physical distance limit; 5. Reliability, 6. Security A bridge connecting k different LANs will have k different MAC layers and k different physical layers, one for each type. 15

16 Bridges from 802.x to 802.y Operation of a LAN bridge from to

17 Bridges from 802.x to 802.y (frame format) Problems with bridging different LANs: 1. Different frame format, 2. Different rate, 3. Different maximum frame length 17

18 Transparent (spanning tree) bridge Forwarding (Filtering) If destination & source address is the same, discard the frame If different, forward the frame Destination unknown, use flooding Spanning tree solve loop problem Address learning Initialise the forwarding database to empty Update the entry in the routing table (make one if it does not exit) with the frame address and arrival time Periodically scan the routing table and purge all old entries (more than a few minutes. 18

19 Spanning tree algorithm Root bridge RPC = 1, 4 RPC = 2, 5 RPC = 1, 4 RPC = 2, 3 RPC = 3, 4 RPC = 2, 3 RPC = 2, 5 X RPC = 3, 4 X X RPC = 4,3,4 Exchange bridge protocol data units (BPDUs) to elect root bridge with highest priority and smallest bridge identifier Each bridge selects root port with minimum root path cost (RPC) from the root to the port Bridges connected to the same segment elect a designated bridge with a port having minimum path cost from the port to the root Port identifiers are used as tiebreakers 19

20 Source routeing bridges Transparent bridges use only subset of the topology (the tree) Source routeing assumes that the sender knows whether or not the destination is on its own LAN. Implicit in that every machine can find the best path to the other machine Discovery frame flooding is used if destination unknown Frame explosion is solved by flooding along the spanning tree 20

21 Comparison of 802 bridges 21

22 Remote bridges It connect two or more distant LANs Put a bridge in each LAN and connect the bridge pairwise with point to point lines (such as leased telephone line) Various protocols can be used on the point to point lines (such as data link protocol) putting complete MAC frame in the payload Or strip off the MAC header and trailer at the sources and put it back at the destination 22

23 Repeaters, Hubs, Bridges and Switches (1/2) (a) Which device is in which layer. (b) Frames, packets, and headers. 23

24 Repeaters, Hubs, Bridges, Switches (2/2) (a) A hub. (b) A bridge. (c) a switch. 24

25 Virtual LANs (a) (b) Four physical LANs organized into two VLANs, by two bridges. The same LANs organized into two VLANs by switches. 25

26 The IEEE 802.1Q Standard Transition from legacy Ethernet to VLAN-aware Ethernet. The shaded symbols are VLAN aware. The empty ones are not. 26

27 The IEEE 802.1Q Standard (2) The (legacy) and 802.1Q Ethernet frame formats. 27

28 Summary MAC protocols and sublayers, LANs: Ethernet, Token ring Token bus Logic Link Control (LLC) LAN interconnections: Transparent (spanning tree) bridge Source routing bridge VLAN 28

ALOHA Class of Multiple Access Protocols

ALOHA Class of Multiple Access Protocols ALOHA Class of Multiple Access Protocols ALOHA, also called pure ALOHA: Whenever a user has a frame to send, it simply transmits the frame. If collision occurs, it waits for a random period of time and

More information

Local Area Networks (LANs)

Local Area Networks (LANs) Local Area Networks (LANs) Broadcast Networks Multiple Access Protocols Ethernet (IEEE 802.3) Token Ring (IEEE 802.5, FDDI) Introduction So far, we have dealt with switched communication networks. Recall

More information

Introduction to LAN/WAN. Medium Access Sublayer (Part I)

Introduction to LAN/WAN. Medium Access Sublayer (Part I) Introduction to LAN/WAN Medium Access Sublayer (Part I) Topics Introduction Multiple Access Protocols Ethernet Wireless LAN Protocols Bridges Misc (brief) High-Speed LANs Satellite Networks Introduction

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Summary of MAC protocols. Medium Access Protocols. LAN Addresses and ARP. LAN technologies. LAN Addresses and ARP. LAN Address (more)

Summary of MAC protocols. Medium Access Protocols. LAN Addresses and ARP. LAN technologies. LAN Addresses and ARP. LAN Address (more) Summary of MAC protocols Medium Access Protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Local & Metropolitan Area Networks

Local & Metropolitan Area Networks Local & Metropolitan Area Networks CS455 Yonshik Choi, Ph.D. Department of Computer Science Illinois Institute of Technology Rice Campus Local Area Networks Characteristic Smaller geographical area a

More information

Review of Legacy LANs: IEEE 802.{2,3,5} MACs

Review of Legacy LANs: IEEE 802.{2,3,5} MACs Review of Legacy LANs: IEEE 802.{2,3,5} MACs 1 Medium Access Control Methods (MACs) Most LANs use shared transmission media. Hence need a mechanism to control access for one station at a time. Most common

More information

Introduction to Local Area Networks

Introduction to Local Area Networks For Summer Training on Computer Networking visit Introduction to Local Area Networks Prepared by : Swapan Purkait Director Nettech Private Limited swapan@nettech.in + 91 93315 90003 Introduction A local

More information

Collision in Star Topology: Case 3. IEEE MAC Frame Format

Collision in Star Topology: Case 3. IEEE MAC Frame Format Collision in Star Topology: Case 3 A and D transmitting Collision presence signal E A B C D 1 IEEE 802.3 MAC Frame Format Figure 16.3 Ethernet frame format differs that Length field is used for other purposes,

More information

EEC 189Q Medium Access Sublayer Computer Networks Reading: Chapter Communication Links Remarks on MAC Sublayer

EEC 189Q Medium Access Sublayer Computer Networks Reading: Chapter Communication Links Remarks on MAC Sublayer EEC 189Q Computer Networks Medium Access Sublayer Medium Access Control (MAC) Random vs. controlled access Random Access Aloha, CSMA, CSMA/CD Network Data Link Physical Medium Access Sublayer Medium Access

More information

Last time. Multiple access protocols. Link-layer addressing. Channel partitioning MAC protocols. Random access MAC protocols

Last time. Multiple access protocols. Link-layer addressing. Channel partitioning MAC protocols. Random access MAC protocols Last time Multiple access protocols Channel partitioning MAC protocols TDMA, FDMA Random access MAC protocols Slotted Aloha, Pure Aloha, CSMA, CSMA/CD Taking turns MAC protocols Polling, token passing

More information

Lectures The Medium Access Control Sub-Layer

Lectures The Medium Access Control Sub-Layer Computer Communications Lectures 11-13 The Medium Access Control Sub-Layer The Channel Allocation Problem Consider a broadcast channel (sometimes also called multi-access or random access channel) How

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

5.2.3 Collision Free Protocols 5 6.

5.2.3 Collision Free Protocols 5 6. 5.2.3 Collision Free Protocols 5 6. 1 5 7. 2 3 5.2.4 Limited contention Protocols 4 Limited Contention protocols 5 6 7 8 5.8 58 5.8. 5.8. 9 The Adaptive Tree Walk protocol (Method for testing soldiers

More information

IEEE 802 LANs. LAN: Local Area Network What is a local area network?

IEEE 802 LANs. LAN: Local Area Network What is a local area network? IEEE 802 LANs LAN: Local Area Network What is a local area network? A LAN is a network that resides in a geographically restricted area LANs usually span a building or a campus 1 Characteristics of LANs

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 2. Direct Link Networks Link Service and Framing Error Detection and Reliable Transmission HDLC, PPP, and SONET Token Ring Ethernet Bridges and

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

Computer Networking

Computer Networking 15-441 Computer Networking Lecture 18 Datalink and LANs Goals Understand and services provided by the datalink layer and the the principles used to implement them. Understand the design principles and

More information

Medium Access Control Sublayer

Medium Access Control Sublayer Medium Access Control Sublayer Gursharan Singh Tatla mailme@gursharansingh.in 1 Introduction In broadcast networks, several stations share a single communication channel. The major issue in these networks

More information

The Link Layer and LANs

The Link Layer and LANs The Link Layer and LANs Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

Switching and Forwarding. Data Link Layer Switching. Datagram Switching. Scalable Networks. Store-and-Forward Switches

Switching and Forwarding. Data Link Layer Switching. Datagram Switching. Scalable Networks. Store-and-Forward Switches Switching and Forwarding Data Link Layer Switching Store-and-Forward Switches Datagram model Virtual circuits Bridges and Extended LANs Cell Switching Segmentation and Reassembly Switch Scalable Networks

More information

6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches?

6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches? TUTORIAL 2 (EKT 332) 6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches? Why broadcast network? -The computers in a LAN are separated by a short

More information

William Stallings Data and Computer Communications. Ethernet (CSAM/CD) Chapter 14 LAN Systems

William Stallings Data and Computer Communications. Ethernet (CSAM/CD) Chapter 14 LAN Systems William Stallings Data and Computer Communications Chapter 14 LAN Systems Ethernet (CSAM/CD) Carriers Sense Multiple Access with Collision Detection Xerox - Ethernet IEEE 802.3 1 IEEE802.3 Medium Access

More information

Review. Multicast Routing. Data Link Layer Services. Recitation tomorrow for Project 3. Three options source-based tree: one tree per source

Review. Multicast Routing. Data Link Layer Services. Recitation tomorrow for Project 3. Three options source-based tree: one tree per source Multicast Routing Review Three options source-based tree: one tree per source shortest path trees reverse path forwarding group-shared tree: group uses one tree minimal spanning (Steiner) center-based

More information

Inst: Chris Davison

Inst: Chris Davison ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks MAC Sublayer Contents Fixed Assignment Protocols Demand Assignment Protocols Contention

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Homework #1 Review Protocol verification

More information

Token Passing: IEEE802.5 standard. IEEE802.5 standard

Token Passing: IEEE802.5 standard. IEEE802.5 standard Token Passing: IEEE802.5 standard. 4 Mbps. maximum token holding time: 10 ms, limiting packet length. packet (token, data) format:. SD, ED mark start, end of packet 1 IEEE802.5 standard. AC access control

More information

CS413 Computer Networks Final Exam Solution

CS413 Computer Networks Final Exam Solution CS413 Computer Networks Final Exam Solution December 21, 2005 Student ID: Name: Problem No. Assigned Marks Your Marks 1 20 2 7 3 6 4 6 5 7 6 10 7 7 8 10 9 7 Total 80 Note: You may write the answers in

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Overview. Next Lecture. Last Lecture. This Lecture. Flow control and error control. Local area networking 1 Source: Sections 13

Overview. Next Lecture. Last Lecture. This Lecture. Flow control and error control. Local area networking 1 Source: Sections 13 Overview Last Lecture Flow control and error control This Lecture Local area networking 1 Source: Sections 13 Next Lecture Local area networking 2 Source: Sections 17.1-17.2 1 Data Link Layer Standards

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Multiple Access Networks. Local Area Networks and Medium Access Control Protocols. Examples (2) Multiple Access Communication: Examples

Multiple Access Networks. Local Area Networks and Medium Access Control Protocols. Examples (2) Multiple Access Communication: Examples Multiple Access Networks Broadcast and multiple access technologies are very common for LANs and for wireless settings. Local Area Networks and Medium Access Control Protocols 2 3 4 Shared Multiple Access

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus

More information

Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point:

Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: Computers connected by communication channels that each connect exactly two computers with access to full channel bandwidth. Forms

More information

Module 4: Local Area Networks (LANs); VLANs and Networking Devices

Module 4: Local Area Networks (LANs); VLANs and Networking Devices Module 4: Local Area Networks (LANs); VLANs and Networking Devices Dr. Associate Professor of Computer Science Jackson State University Jackson, MS 39217 Phone: 601-979-3661 E-mail: natarajan.meghanathan@jsums.edu

More information

Lecture 22 Ethernet EECS 122. University of California Berkeley

Lecture 22 Ethernet EECS 122. University of California Berkeley Lecture 22 Ethernet EECS 122 University of California Berkeley Ethernet Overview Physical Layer MAC Learning and Spanning Tree VLAN Link Aggregation XON/XOFF 802.11 ETHERNET 2 Overview Typical Setup Names

More information

LAN switching and Bridges

LAN switching and Bridges LAN switching and s Relates to Lab 6. Covers interconnection devices (at different layers) and the difference between LAN switching (bridging) and routing. Then discusses LAN switching, including learning

More information

Data communication I. Local Area Networks (LANs) Lecture 8 LANs

Data communication I. Local Area Networks (LANs) Lecture 8 LANs Data communication I Lecture 8 LANs Local Area Networks (LANs) Topologies Transmission Media LAN protocol architecture LAN networking devices High speed LANs Ethernet Fibre Channel 1 WAN (Wide Area Network)

More information

Ethernet uses CSMA/CD

Ethernet uses CSMA/CD Stuff Project phase III out, due April 25. Guest lecturer next Tues: Vern Paxson on Network Security. Lecture today: Finish multiple access Link layer addressing Hub vs Switch DataLink Layer 1 Ethernet

More information

LAN switching and Bridges

LAN switching and Bridges LAN switching and Bridges CS491G: Computer Networking Lab V. Arun Slides adapted from Liebeherr and El Zarki, and Kurose and Ross 1 Outline Interconnection devices Bridges/LAN switches vs. Routers Learning

More information

Chapter 4. The Medium Access Sublayer

Chapter 4. The Medium Access Sublayer Chapter 4 The Medium Access Sublayer 1 Chapter 4 The Medium Access Layer 4.1 The Channel Allocation problem - Static and dynamic channel allocation in LANs & MANs 4.2 Multiple Access Protocols - ALOHA,

More information

06/02/ Local & Metropolitan Area Networks. Overview. Medium Access Sublayer (1) ACOE322

06/02/ Local & Metropolitan Area Networks. Overview. Medium Access Sublayer (1) ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control 1 Overview The architecture of a LAN is best described in terms of a layering of protocols that organize

More information

Module 6. Internetworking. Version 2 CSE IIT, Kharagpur

Module 6. Internetworking. Version 2 CSE IIT, Kharagpur Module 6 Internetworking Lesson 1 Internetworking Devices Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify the need for internetworking State various issues

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE 333: Introduction to Communication Networks Fall 2001 Lecture 17: Medium Access Control V Perfectly scheduled approaches Token ring networks 1 We have categorized channel allocation techniques as either

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Lecture slides by Lawrie Brown High Speed LANs Congratulations. I knew the record would stand until it was

More information

Methods of Token Reinsertion

Methods of Token Reinsertion 6.3.3 Token-Passing Rings token Free Token = Poll Frame Delimiter is Token Free = 01111110 Busy = 01111111 Listen mode Transmit mode Input from ring Delay Output to ring Delay Ready station looks for free

More information

CSE 123A Midterm Exam

CSE 123A Midterm Exam CSE 123A Midterm Exam July 19, 2006 Name: Email: Be sure to read questions carefully and answer all parts. Use complete sentences and explain your answers. One word responses will not be given credit.

More information

The Data Link Layer. Reading: Ch. 2.2, 2.6, 3.1, 3.2

The Data Link Layer. Reading: Ch. 2.2, 2.6, 3.1, 3.2 The Data Link Layer Reading: Ch. 2.2, 2.6, 3.1, 3.2 Goals for Today s Class Multiple-Access (Broadcast) Networks Ethernet Network Connecting Devices Repeaters and hubs Bridges / LAN switches Routers Network

More information

IEEE 802 Project ISO 8802 Standards

IEEE 802 Project ISO 8802 Standards IEEE 802 Project ISO 8802 Standards Computer Networks Lecture 4 http://goo.gl/pze5o8 Standardization in LANs IEEE efforts to standardize the current state of LAN technologies (since 1982) New specifications

More information

Link Layer Addressing & Ethernet HIT Shimrit Tzur-David

Link Layer Addressing & Ethernet HIT Shimrit Tzur-David Link Layer Addressing & Ethernet HIT Shimrit Tzur-David Shimrit Tzur-David 1 MAC Addresses and ARP 32-bit IP address: network-layer address used to get datagram to destination IP subnet MAC (or LAN or

More information

Local Area Networks (LAN) Technology

Local Area Networks (LAN) Technology COMP476 Networked Computer Systems Local Area Networks (LAN) Technology Goals for Today Know the different type of networks Understand how multiple computers can share the same wires Learn some acronyms

More information

Link Layer. 5.6 Link-layer switches 5.7 PPP 5.8 Link Virtualization: ATM, MPLS

Link Layer. 5.6 Link-layer switches 5.7 PPP 5.8 Link Virtualization: ATM, MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3 Multiple access protocols 5.4 Link-layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link Virtualization:

More information

Ethernet. Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff

Ethernet. Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff Shared Access Networks are Different Shared Access Networks assume multiple nodes on the same physical

More information

Problem Max. Points Act. Points Grader

Problem Max. Points Act. Points Grader Networks and Protocols Course: 320301 Jacobs University Bremen Date: 2008-10-22 Dr. Jürgen Schönwälder Duration: 75 minutes Midterm Examination The Jacobs University s Code of Academic Integrity applies

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

How does IEEE fit into ISO OSI-7 layer model? Existing IEEE LAN standards. Access to physical medium. model?

How does IEEE fit into ISO OSI-7 layer model? Existing IEEE LAN standards. Access to physical medium. model? Existing IEEE LAN standards slide 1 slide 2 How does IEEE fit into ISO OSI-7 layer model? the standards produced by IEEE in LANs have widely been adopted by industry the 802 committee have become internationally

More information

Link Layer. Link Layer: Introduction. Link layer. Link Layer Services. Error Detection. Link Layer. Terminology:

Link Layer. Link Layer: Introduction. Link layer. Link Layer Services. Error Detection. Link Layer. Terminology: Link Layer 5.4 Link-layer Link Layer: Introduction Terminology: hosts and routers are nodes communication channels that connect adjacent nodes along communication path are links wired links wireless links

More information

TCP/IP in details. initial sequence number was exchanged, then it incremented by the size of data sent in bytes.

TCP/IP in details. initial sequence number was exchanged, then it incremented by the size of data sent in bytes. TCP/IP in details TCP sliding window sequence number initial sequence number was exchanged, then it incremented by the size of data sent in bytes. http://www.tcpipguide.com/free/t_tcpslidingwindowdatatransferandackno

More information

Networking: Physical & Link Layer

Networking: Physical & Link Layer CS 4410 Operating Systems Networking: Physical & Link Layer Summer 2016 Cornell University Today Communication between devices in the same LAN. 2 Protocol Stack Computer A Computer B Message M Application

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Multiple Access Multiple Access In early data communication systems, one solution to provide access of remote terminals to a

More information

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 5 Link Layer CPSC 335 Data Communication Systems Readings: 5.1, 5.3 David Nguyen Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Adapted from

More information

Computer Networks. Unit 5: Local Area Networks. LANs basics The IEEE 802 standard Ethernet MAC protocols Internetworking: repeaters and bridges

Computer Networks. Unit 5: Local Area Networks. LANs basics The IEEE 802 standard Ethernet MAC protocols Internetworking: repeaters and bridges Computer Networks Unit 5: Local Area Networks LANs basics The IEEE 802 standard Ethernet MAC protocols Internetworking: repeaters and bridges unit 5 1 Introduction A local area network is a communication

More information

Local Area Networks. Ethernet 802.3 LAN - 7-1.

Local Area Networks. Ethernet 802.3 LAN - 7-1. Local Area Networks Ethernet 802.3 LAN - 7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN - 7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total

More information

Ethernet. Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff

Ethernet. Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff Our Focus is Ethernet History Developed by Bob Metcalfe and others at Xerox PARC in mid-1970s Roots

More information

The Data Link Layer Reading: Ch. 2.6, 3.1 Context Logical Link Media Access Control (MAC)

The Data Link Layer Reading: Ch. 2.6, 3.1 Context Logical Link Media Access Control (MAC) The Data Link Layer Reading: Ch. 2.6, 3.1 Context Application OSI TCP/IP Application Transport Network Data Link Presentation Session Transport Network (Data) Link Physical Link Sublayers Logical Link

More information

Introduction to Medium Access Control CS 571 Fall Kenneth L. Calvert All rights reserved

Introduction to Medium Access Control CS 571 Fall Kenneth L. Calvert All rights reserved Introduction to Medium Access Control CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved The Problem Given: A broadcast medium connecting N stations When one station transmits, every other station

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 15 Local Area Network Overview Eighth Edition by William Stallings Lecture slides by Lawrie Brown Local Area Network Overview The whole of this operation is described

More information

Link Layer. Ethernet. 5.6 Link-layer switches 5.7 PPP 5.8 Link Virtualization: MPLS

Link Layer. Ethernet. 5.6 Link-layer switches 5.7 PPP 5.8 Link Virtualization: MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Link-layer switches 5.7 PPP 5.8 Link Virtualization:

More information

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate

More information

Chapter 5: Link layer

Chapter 5: Link layer Chapter 5: Link layer our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks: Ethernet,

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

MIDTERM EXAMINATION Spring 2010 CS610- Computer Network

MIDTERM EXAMINATION Spring 2010 CS610- Computer Network MIDTERM EXAMINATION Spring 2010 CS610- Computer Network In Point-to-Point topology there are two topologies. Tree and Ring Star and Ring Star and Tree None of the given In Point-to-Point topology there

More information

Telematics. 7th Tutorial - ATM, Bridging, Spanning Tree, VLAN

Telematics. 7th Tutorial - ATM, Bridging, Spanning Tree, VLAN 19531 - Telematics 7th Tutorial - ATM, Bridging, Spanning Tree, VLAN Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 09. December, 2010 Institute of Computer

More information

LAN Protocols. Required reading: Garcia 6.7, 6.8. CSE 3213, Fall 2010 Instructor: N. Vlajic

LAN Protocols. Required reading: Garcia 6.7, 6.8. CSE 3213, Fall 2010 Instructor: N. Vlajic 1 LAN Protocols Required reading: Garcia 6.7, 6.8 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 2.2 2.1 How to reliably transmit groups of bits (frames) over the medium? Forward Error Correction (e.g. Internet

More information

Spanning Tree Protocol

Spanning Tree Protocol Spanning Tree Protocol And Other Advanced Ethernet Topics 2E1623 Data Links and Local Area Networks Learning Bridges Loop Problem From B. A. Forouzan: Data Communications and Networking, 3rd ed, McGraw-Hill

More information

Last time. Link layer overview. Error detection and correction PPP. Services Adapters. Parity check Internet checksum CRC.

Last time. Link layer overview. Error detection and correction PPP. Services Adapters. Parity check Internet checksum CRC. Last time Link layer overview Services Adapters Error detection and correction Parity check Internet checksum CRC PPP Byte stuffing 4-1 This time Multiple access protocols Link-layer addressing 4-2 Link

More information

Last Lecture: Data Link Layer

Last Lecture: Data Link Layer Last Lecture: Data Link Layer 1. Design goals and issues!" 2. (More on) Error Control and Detection!" 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless

More information

LAN Addresses and ARP. Summary of MAC protocols

LAN Addresses and ARP. Summary of MAC protocols LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node s LAN interface card (adapter card) on the local LAN

More information

Medium Access Sublayer

Medium Access Sublayer Medium Access Sublayer Topology of the Network Bus, Ring, Tree Protocols IEEE 802.3 for bus topology IEEE 802.4 for token bus IEEE 802.5 for token ring FDDI for fibre ring IEEE 802.11 for wireless networks

More information

Chapter 13 Wired LANs: Ethernet

Chapter 13 Wired LANs: Ethernet Chapter 13 Wired LANs: Ethernet Copyright The Companies, Inc. Permission required for reproduction or display. 13-1 IEEE STANDARDS Ethernet: It is a LAN protocol that is used in Bus and Star topologies

More information

Multiple Access Protocols for Link Layer. Multiple Access Protocols

Multiple Access Protocols for Link Layer. Multiple Access Protocols Multiple Access Protocols for Link Layer Multiple Access Protocols Single shared broadcast channel Two or more simultaneous transmissions by nodes: interference collision if node receives two or more signals

More information

Configuring STP. Understanding Spanning-Tree Features CHAPTER

Configuring STP. Understanding Spanning-Tree Features CHAPTER CHAPTER 15 This chapter describes how to configure the Spanning Tree Protocol (STP) on port-based VLANs on the Catalyst 2960 switch. The switch can use either the per-vlan spanning-tree plus (PVST+) protocol

More information

In this lecture we shall consider about collision-free protocols where collision is completely avoided. Here is the outline of today s lecture.

In this lecture we shall consider about collision-free protocols where collision is completely avoided. Here is the outline of today s lecture. Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 26 Medium Access Control- II Hello and welcome to today s lecture on Medium

More information

VTU-NPTEL-NMEICT Project

VTU-NPTEL-NMEICT Project Assignment Questions Module 1: Networks Introduction 1. Discuss the properties of a network. Module 3 & 4: Packetized File Transfer and Layering 2. Discuss the key design issues for layering in a network

More information

What Is A Protocol? Chapter 2 The OSI Model. Protocol Stacks. Protocol Stacks(Continued) OSI Model. What Is the OSI Model?

What Is A Protocol? Chapter 2 The OSI Model. Protocol Stacks. Protocol Stacks(Continued) OSI Model. What Is the OSI Model? What Is A Protocol? Chapter 2 The OSI Model Kuang-hua Chen Department of Library and Information Science National Taiwan University For computers to be able to communicate, a language must be defined among

More information

Internet Protocols Fall Outline

Internet Protocols Fall Outline Internet Protocols Fall 2004 Lecture 4 Andreas Terzis Outline FEC MAC Protocols Channel Partitioning vs. Random Access Protocols Aloha and Slotted Aloha CSMA CSMA/CD (Ethernet) CS 449/Fall 04 2 1 Forward

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

Configuring STP. Understanding Spanning-Tree Features CHAPTER

Configuring STP. Understanding Spanning-Tree Features CHAPTER CHAPTER 14 This chapter describes how to configure the Spanning Tree Protocol (STP) on port-based VLANs on the Cisco ME 3400 Ethernet Access switch. The switch can use the per-vlan spanning-tree plus (PVST+)

More information

J.GODWIN PONSAM & S.CHRISTOBEL DIANA ASST.PROFESSOR SRM University, Kattankulathur

J.GODWIN PONSAM & S.CHRISTOBEL DIANA ASST.PROFESSOR SRM University, Kattankulathur 8/22/2011 School of Computing, Department of IT IT 0305 COMPUTER NETWORKS FIFTH SEMESTER UNIT III J.GODWIN PONSAM & S.CHRISTOBEL DIANA ASST.PROFESSOR SRM University, Kattankulathur 1 Unit iii School of

More information

MAC Protocols: A Taxonomy Computer Networking. Random Access Protocols. Outline. Aloha Basic Technique. Slotted Aloha. Lecture 5 Ethernet

MAC Protocols: A Taxonomy Computer Networking. Random Access Protocols. Outline. Aloha Basic Technique. Slotted Aloha. Lecture 5 Ethernet MAC Protocols: A Taxonomy 15-441 Computer Networking Lecture 5 Ethernet Three broad classes: Channel partitioning Divide channel into smaller pieces (time slots, frequency) Allocate piece to node for exclusive

More information

CS 3516: Advanced Computer Networks

CS 3516: Advanced Computer Networks Welcome to CS 3516: Advanced Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: Fuller 320 Fall 2016 A-term 1 Some slides are originally from the course materials of the textbook

More information

Lecture 8: Carrier Sense Multiple Access"

Lecture 8: Carrier Sense Multiple Access Lecture 8: Carrier Sense Multiple Access" CSE 123: Computer Networks Alex C. Snoeren HW 2 due next Wednesday! Lecture 8 Overview" Methods to share physical media: multiple access Random access Channelizing

More information

Table of Contents. (Rapid) Spanning Tree Protocol. An even worse bridge loop. A simple bridge loop. Bridge loops Two bridges Three bridges (R)STP

Table of Contents. (Rapid) Spanning Tree Protocol. An even worse bridge loop. A simple bridge loop. Bridge loops Two bridges Three bridges (R)STP Table of Contents (Rapid) Spanning Tree Protocol (R)STP Bridge loops Two bridges Three bridges dr. C. P. J. Koymans Informatics Institute University of Amsterdam March 11, 2008 Network representation Incomplete

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - II

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - II Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - II CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins University

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Friday, Feb 17th Today: Link Layer

More information

understand principles behind data link layer services:

understand principles behind data link layer services: Data Link Layer Our goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing reliable data transfer,

More information

Chapter 10 Networking Types

Chapter 10 Networking Types Chapter 10 Networking Types Aims: Define the infrastructure of networks. Outline the differing networking topologies. Outline the main networking technologies. Interconnection of networks LAN LAN B B BACKBONE2

More information

Data Link Layer. Page 1. Ethernet

Data Link Layer. Page 1. Ethernet Sicherungsebene Network Categories Local Area Networks (LAN): 10m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

More information

Data Link Layer - Overview of LLC and MAC Introduction to

Data Link Layer - Overview of LLC and MAC Introduction to Data Link Layer - Overview of LLC and MAC Introduction to 802.11 Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Objectives You will be able to describe the objectives of

More information

Medium Access Control. Medium Access Control. Ideal Multiple Access Protocol. Multiple Access protocols

Medium Access Control. Medium Access Control. Ideal Multiple Access Protocol. Multiple Access protocols Medium Access Control Medium Access Control medium access control (MAC) is important when a shared medium is used to communicate between stations MAC layer is important in LANs WANs typically use point-to-point

More information