Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)



Similar documents
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Based on Computer Networking, 4 th Edition by Kurose and Ross

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

RTT 60.5 msec receiver window size: 32 KB

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

RETI DI TELECOMUNICAZIONI

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

CSMA/CA. Information Networks p. 1

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Data Link Layer. Page 1. Ethernet

Introduction to Ethernet

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

COMPUTER NETWORKS HANDOUTS LECTURERS # PREPARED BY: HAMMAD KHALID KHAN. Copyright Virtual University of Pakistan

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

RARP: Reverse Address Resolution Protocol

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Random Access Protocols

Level 2 Routing: LAN Bridges and Switches

Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

Written examination in Computer Networks

CSE 123A Computer Networks


Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Wiereless LAN

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

28 Networks and Communication Protocols

Fiber Distributed Data Interface

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Welcome to the Introduction to Controller Area Network web seminar My name is William Stuart, and I am a Applications Engineer for the Automotive

Tutorial.

Transport Layer Protocols

RFC 2544 Testing of Ethernet Services in Telecom Networks

LIN (Local Interconnect Network):

Chapter 7 Low-Speed Wireless Local Area Networks

Ethernet. Ethernet. Network Devices

Lesson 2-3: Ethernet Basics

11/22/

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Local-Area Network -LAN

How To Communicate With A Token Ring Network (Dihon)

Algorithms for Interference Sensing in Optical CDMA Networks

Performance Evaluation of Wired and Wireless Local Area Networks

Ring Local Area Network. Ring LANs

Dynamic Source Routing in Ad Hoc Wireless Networks

iseries Ethernet cabling and configuration requirements

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Basic processes in IEEE networks

Ethernet, VLAN, Ethernet Carrier Grade

- Hubs vs. Switches vs. Routers -

Verifying Network Bandwidth

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Selecting a Web Server Connection Rate Gilbert Held

IT Data Communication and Networks (Optional)

Notes Odom, Chapter 4 Flashcards Set:

Controlled Random Access Methods

IEEE Technical Tutorial. Introduction. IEEE Architecture

CS423: Lectures 2-4, Physical Layer. George Varghese. April 16, 2008

INTRODUCTION TO 100BASE-T: FAST (AND FASTER) ETHERNET

Candidates should attempt FOUR questions. All questions carry 25 marks.

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Data Communication Networks

CSE 123: Computer Networks Fall Quarter, 2014 MIDTERM EXAM

WIRELESS ETHERNET (IEEE )

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

LAN Switching and VLANs

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF

Network Topologies. Network Topologies

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Gigabit Ethernet. Today a number of technologies, such as 10BaseT, Auto-Negotiation

Analog vs. Digital Transmission

Local Address Management in IoT environments

Communications and Computer Networks

Protocols. Packets. What's in an IP packet

WHITEPAPER. Image processing in the age of 10 Gigabit Ethernet

LAN / WAN Technologies

10/100 Mbps Ethernet MAC

Problems of Developing Spacewire Ethernet Bridge and Transferring Spacewire Packages Over Ethernet

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: wireless embedded network

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

WAN Data Link Protocols

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Computer Networks. By Hardeep Singh

GATE CS Topic wise Questions Computer Network

Gigabit Ethernet: Architectural Design and Issues

LAN Performance Measurements Lab

Network Categories. Network Types for the Local Range. Ethernet

Mathatma Gandhi University

Industrial Networks & Databases

Transcription:

reas for Discussion Direct Link Networks Joseph Spring School of Computer Science Sc - Computer Network Protocols & rch s ased on Chapter 2, Peterson & Davie, Computer Networks: Systems pproach, 5 th Ed Ethernet (Section 2.6) Introduction Physical properties ccess Protocol Frame format ddresses Transmitter algorithm Lecture - Ethernet 1 Lecture - Ethernet 2 Ethernet - Introduction Developed in mid 70 s by Xerox PRC (Palo lto Research Center) Introduction Original 10 Mbps standard defined in 1978 by Dec, Intel and Xerox This later formed the basis of IEEE standard 802.3 Lecture - Ethernet 3 Lecture - Ethernet 4 Ethernet - Introduction CSM/CD Carrier Sense Multiple ccess with Multiple ccess set of nodes share a single physical link Carrier Sense ll nodes can distinguish between an idle and a busy link Each node listens as it transmits and can therefore detect when the frame it transmits has been corrupted Lecture - Ethernet 5 Physical Properties Lecture - Ethernet 6 Lecture - Ethernet 1

Ethernet Physical Properties Transmission Rate 10 Mbps 50 Ohm Coaxial cable Maximum length 500 metres Host Connections Taps at least 2.5 metres apart Terminators Placed at end of Ethernet cable to match line impedance absorb signals and minimise reflections Lecture - Ethernet 7 Ethernet Physical Properties Repeaters Maximum of four repeaters between nodes so maximum reach of 2500 metres Signal roadcast over entire network it Representation Manchester Encoding Number of Hosts Up to 1024 Hosts Note: There are both cheaper and faster versions of Ethernet Lecture - Ethernet 8 Ethernet Transceiver and daptor Ethernet Repeaters (Fig 2.27) Transceiver daptor Ethernet Cable (Fig 2.28) Host Host Repeater Lecture - Ethernet 9 Lecture - Ethernet 10 lternative Ethernet Technologies 1. Original 10 Mbps Ethernet developed by Xerox et al. 2. IEEE 802.3: standardisation of above (10ase5) Ethernet Hubs 10aseT (twisted pair Ethernet) Often employs multiple point-to-point connections in a multi-way repeater known as a hub 3. 10ase2: based on thinner coaxial cable 4. 10aseT: based on twisted pair wire Hub Hub 5. Fast Ethernet: 100Mbps 6. Gigabit Ethernet: 1000Mbps Lecture - Ethernet 11 Hubs are also used with 100Mbps Ethernet Note: frames from one host always reach all other hosts on the Ethernet, irrespective of the configuration Lecture - Ethernet 12 Lecture - Ethernet 2

Ethernet - Frame Format (Fig 3.21: original Dec/Intel/Xerox format pre IEEE format) ccess Protocol 64 48 48 16 32 Dest Src ody 8 Postamble (Fig 2.30: IEEE 802.3 format Ethernet format p115, 3rd Ed.) 64 48 48 16 32 Dest Src ody field now used to define length of frame Lecture - Ethernet 13 Lecture - Ethernet 14 Ethernet Frame Format 64 bits for synchronisation; alternating ones and zeros Serves as demultiplexing key Identifies higher-level protocol associated with the frame Data Minimum of 46 bytes to allow collision detection Maximum of 1500 bytes to prevent hogging 32 bit Postamble 8 bits to detect end of frame Ethernet Frame Format 2 Frame Formats The second Ethernet frame format shown in 2 nd, 3 rd and 4 th edition of the text Earlier texts imply that first Ethernet frame is the pre IEEE format Difference Only difference is that the type field is used to define the length of the frame Hence postamble is discarded Note: Since original type field values always exceed 1500, the maximum length of an Ethernet frame, both frame formats can coexist in a single Ethernet system Lecture - Ethernet 15 Lecture - Ethernet 16 Ethernet ddresses Source ddress 48 bit ess Destination ddress 48bit ess Every Ethernet node world-wide has a unique ess Each manufacturer is allocated a unique block of esses Ethernet ddresses n Ethernet daptor receives all frames and accepts: Frames essed to its own (unique) ess Frames essed to the broadcast ess (all 1 s) Frames essed to certain multicast esses ddresses that start with one Could therefore use a specific multicast ess to send messages to all file servers ll frames In promiscuous mode Lecture - Ethernet 17 Lecture - Ethernet 18 Lecture - Ethernet 3

Transmission lgorithm Sending a frame: If line idle daptor transmits the frame immediately Since no arbitration is required, access time is excellent Upper data limit of 1500 bytes avoids hogging If line busy daptor waits until the line is idle and then transmits immediately good way to encourage collisions!!! Transmission lgorithm If a collision is detected: (Own message not read back successfully) 1. daptor transmits a 32-bit jamming sequence and dthen stops t least 96 bits are therefore transmitted, a 64 bit preamble plus the jamming sequence This ensures that all other units also detect a collision Lecture - Ethernet 19 Lecture - Ethernet 20 Transmission lgorithm If a collision is detected: (Own message not read back successfully) 2. Wait a random time and try again Initially the adaptor waits between 0 and 51.2 ms 3. The waiting interval used doubles after each successive failure called exponential backoff 4. Give up eventually, typically after 16 tries, and report an error Lecture - Ethernet 21 Ethernet adaptors must always transmit at least 512 bits of each frame Every Ethernet frame must therefore be at least this long 14 bytes header 46 bytes of data 4 bytes of 512 bits takes 51.2 msec to transmit Enough time to get from one end of a maximum size Ethernet to the other and back (see Fig 2.31) Lecture - Ethernet 22 (Fig 2.31 p123) Suppose daptor starts to send a frame from one end Just before the frame reaches, also starts to transmit If doesn t transmit for one RTT the signal from will fail to reach before completes transmission will therefore fail to detect the collision Lecture - Ethernet 23 Lecture - Ethernet 24 Lecture - Ethernet 4

(Fig 2.31 p123) Lecture - Ethernet 25 Lecture - Ethernet 26 Works very well surprisingly well under lightly loaded conditions However, utilisation over 30% is considered heavy There are then too many collisions for Ethernet to work effectively Note: Ethernets do not saturate gracefully eyond a certain point the more frames the nodes try to send, the lower the effective bandwidth Lecture - Ethernet 27 Hosts therefore typically provide end-to-end flow control mechanisms to avoid excessive use of the Ethernet by one node See pages 123-124 for more details Lecture - Ethernet 28 Summary Ethernet (Section 2.6) Introduction Physical properties ccess Protocol Frame format ddresses Transmitter algorithm Lecture - Ethernet 29 Lecture - Ethernet 5