Review of Legacy LANs: IEEE 802.{2,3,5} MACs

Similar documents
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Data Link Protocols. TCP/IP Suite and OSI Reference Model

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Real-Time (Paradigms) (51)

Networking Test 4 Study Guide

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

11/22/

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Random Access Protocols

Introduction to Ethernet

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Module 15: Network Structures

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

The OSI and TCP/IP Models. Lesson 2

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

The Structure and Coding of Logical Link Control (LLC) Addresses: A Tutorial Guide

Chapter 14: Distributed Operating Systems

Data Communication and Computer Network

Based on Computer Networking, 4 th Edition by Kurose and Ross

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

High-Level Data Link Control

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Chapter 16: Distributed Operating Systems

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Lesson 2-3: Ethernet Basics

Ring Local Area Network. Ring LANs

Performance Evaluation of Wired and Wireless Local Area Networks

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Protocols and Architecture. Protocol Architecture.

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

CSMA/CA. Information Networks p. 1

- Hubs vs. Switches vs. Routers -

Communication Systems Internetworking (Bridges & Co)

IT4405 Computer Networks (Compulsory)

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Mathatma Gandhi University

Tutorial.

EPL 657 Wireless Networks

CSCI 362 Computer and Network Security

Data Communication Networks

Communications and Computer Networks

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Ethernet. Ethernet. Network Devices

Data Communication Networks and Converged Networks

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

Transport Layer. Chapter 3.4. Think about

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Computer Networks. Chapter 5 Transport Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

DATA COMMUNICATION AND NETWORKS

Lab VI Capturing and monitoring the network traffic

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

Overview of Routing between Virtual LANs

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

RTT 60.5 msec receiver window size: 32 KB

Virtual LANs. or Raj Jain

Ethernet, VLAN, Ethernet Carrier Grade

IEEE Wireless LAN Standard. Updated: 5/10/2011

WAN Data Link Protocols

Controlled Random Access Methods

UPPER LAYER SWITCHING

Chapter 2 - The TCP/IP and OSI Networking Models

PPP (Point-to-Point Protocol)

Computer Networks Vs. Distributed Systems

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Industrial Networks & Databases. Protocols and Networks - Device Bus - - Field Bus -

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

LAN Switching and VLANs

Network Models OSI vs. TCP/IP

DG Forwarding Algorithm

CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

This course has been retired. View the schedule of current <a href=

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF

IEEE WIRELESS LAN STANDARD

Zarządzanie sieciami telekomunikacyjnymi

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

June Bridge & Switch. Pietro Nicoletti Piero[at]studioreti.it. Bridge-Switch-Engl - 1 P. Nicoletti: see note pag. 2

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

The OSI Model: Understanding the Seven Layers of Computer Networks

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Token-ring local area network management

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks CS321

Chapter 7 Low-Speed Wireless Local Area Networks

Communication Networks. MAP-TELE 2011/12 José Ruela

Transcription:

Review of Legacy LANs: IEEE 802.{2,3,5} MACs 1

Medium Access Control Methods (MACs) Most LANs use shared transmission media. Hence need a mechanism to control access for one station at a time. Most common methods are: - CSMA/CD - Carrier-Sense-Multiple-Access with Collision Detection. (Bus) - Control token. (Ring or bus) MAC protocols permit the transmission of a MAC frame in broadcast mode to a specific station address. Above the MAC there must be a data-link protocol which uses the MAC service for transmission of its data frame. IEEE 802 series of standards includes many MAC protocols for different types of LAN plus a data-link protocol (LLC) which is common to all of them. 2

IEEE 802 and OSI Reference Models OSI Application Presentation Session Transport Network Data Link Physical OSI or other protocols Application TCP DoD Protocols IP UDP Logical Link Control (LLC) Medium Access Control (MAC) Physical IEEE 802 IEEE 802.x LANs use common LLC plus different MAC and physical layers. 3

IEEE 802 Protocols Network Layer IEEE 802 Logical link control Medium access control Physical 802.2 802.3 802.4 802.5 802.11 Data link layer Physical layer ISO reference model Transmission medium 802.2 = Logical link control protocol 802.3 = CSMA/CD 802.4 = Token bus Medium access control protocols 802.5 = Token ring 802.11 = Wireless IEEE 802.x LANs use common LLC plus different MAC and physical layers. 4

IEEE 802.x Standards The LLC and MAC combined are equivalent to the OSI data-link functional definition. - Plus the multiplexing of many users (ports) within a station by the LLC. The OSI D-L service does not include multiplexing. Split into the two sub-layers because of: - The shared access problem which does not apply to point-point links. - Desire to use a common LLC sub-layer and specialise the MAC only to the physical topology and access method. Network layer, for a single LAN, not significant because there is no routing to be done (Not covered by 802 standards). When LAN is part of an Internet, network layer more siginificant (e.g. Internet Protocol) and is covered in Wide-Area Networks. 5

Logical Link Control (IEEE 802.2) Uses services of a MAC sublayer for physical addresses and access to shared medium. MAC also does frame delimiting and FCS functions. Normally provides connectionless, unacknowledged mode. But other options: - Acknowledged CL - CO mode. Similar to HDLC, with above restrictions in function, plus... Address field identifies SAP (Service Access Point) or port in source (SSAP) and destination (DSAP) stations, not physical address of station. Hence LLC layer can multiplex many ports. 1 1 1-2 N octets DSAP SSAP Control Data N depends on limit on underlying MAC frame. LLC Frame 6

Ethernet MAC (CSMA-CD, 802.3): Collisions CSMA-CD: Carrier Sense Muliple Access with Collision Detection. Party-line MAC protocol: - Listen before talking. - Back off (carrier detect) or transmit (no carrier detect). Attempts to eliminate collisions. But propagation time is counteractive; frames from A and C collide, so: Listen while talking and abort if necessary. Collisions require time to clear entire (unbridged) segment before new transmission can start. A B C D A B C D A B C D A B C D 7

Ethernet Throughput Throughput 1.0 0.5 Ideal Typical a = 0.1* Typical 0.5 1.0 Load (multiple active stations) * a = Max propagation time on segment Average duration of frame 5 10 15 20 Number of active stations creating load 8

Token Ring Topology Token rotation B B B Stations transmit only on receipt of token. No collisions. 9

Token Passing (Single priority) Free token D D D A C A C A C B A waits for free token. Changes it to SOF, appends data frames addressed to C (and/or others). B B repeats frames with minimal delay. C copies frames addressed to it. Free token B A sees own header return, sends free token, does not repeat frames. OR (early release) A sends free token after completing frame transmission. 10

Comparative Performance Throughput 1.0 0.5 Ideal Token ring Token bus Typical Ethernet Token ring Token bus Ethernet, a=0.1 Typical Ethernet 0.5 1.0 Load (multiple active stations) * a = Max propagation time on segment Average duration of frame 5 10 15 20 Number of active stations creating load 11

802.5 Token Ring Characteristics Station interfaces and MAC protocol are much more complex than CSMA-CD. Repeaters are active. Contention is non-destructive. Token holding time is limited to limit access delay. With only a few active stations, time lost in: - idle token circulation; - new token release after header returns. Not readily scalable to very high speeds. With the cost of 16 Mb/s interfaces and medium, throughput is still less than 16 Mb/s because transmission medium is shared by all stations. Segmentation, using 802.1D bridges, required to boost total capacity, as with 802.3. Priority can be used to provide degree of non-homogeneous access but all interfaces are the same. 12