4. MAC protocols and LANs

Similar documents
LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Based on Computer Networking, 4 th Edition by Kurose and Ross

Data Link Layer. Page 1. Ethernet

Level 2 Routing: LAN Bridges and Switches

Communication Systems Internetworking (Bridges & Co)

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSMA/CA. Information Networks p. 1

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Real-Time (Paradigms) (51)

Ethernet (LAN switching)

High-Level Data Link Control

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

June Bridge & Switch. Pietro Nicoletti Piero[at]studioreti.it. Bridge-Switch-Engl - 1 P. Nicoletti: see note pag. 2

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Network Categories. Network Types for the Local Range. Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Ethernet, VLAN, Ethernet Carrier Grade

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Random Access Protocols

Controlled Random Access Methods

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

RTT 60.5 msec receiver window size: 32 KB

11/22/

Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Virtual LANs. or Raj Jain

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

The ABCs of Spanning Tree Protocol

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

COMPUTER NETWORKS - LAN Interconnection

Performance Evaluation of Wired and Wireless Local Area Networks

Introduction to Ethernet

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Howstuffworks "How LAN Switches Work" Click here to go back to the normal view!

COMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.

Overview of Routing between Virtual LANs

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

How To Make A Multi-User Communication Efficient

Module 15: Network Structures

- Hubs vs. Switches vs. Routers -

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Transport Layer Protocols

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Chapter 14: Distributed Operating Systems

UPPER LAYER SWITCHING

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Ring Local Area Network. Ring LANs

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

Chapter 16: Distributed Operating Systems

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Final for ECE374 05/06/13 Solution!!

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Data Communication and Computer Network

Candidates should attempt FOUR questions. All questions carry 25 marks.

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Chapter 7 Low-Speed Wireless Local Area Networks

CSE 123A Computer Networks

LAN Switching and VLANs

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

MAC Sublayer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Tutorial.

How To Communicate With A Token Ring Network (Dihon)

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

Internet Packets. Forwarding Datagrams

ECE 333: Introduction to Communication Networks Fall 2002

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

VXLAN: Scaling Data Center Capacity. White Paper

Written examination in Computer Networks

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Computer Networks Vs. Distributed Systems

Data Communication Networks and Converged Networks

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

SSVP SIP School VoIP Professional Certification

LLC: Frame Construction. Layer 2: Division into two Parts. Error-detecting and -correcting Codes. Error-correcting Codes

WAN Data Link Protocols

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Data Communication Networks

Switching in an Enterprise Network

Transcription:

4. MAC protocols and LANs 1

Outline MAC protocols and sublayers, LANs: Ethernet, Token ring and Token bus Logic Link Control (LLC) sublayer protocol Bridges: transparent (spanning tree), source routing and remote bridges 2

Multiple Access Control (MAC) Protocols There are two categories of networks: One uses point to point connections: computer dial-up links, using SLIP, PPP, HDLC The other uses broadcast channels: more than one stations share the same channel, such as LANs using random access or token MAC protocols is used to determine which station goes next to access the shared channels 3

Random Access: Aloha and Slotted Aloha User transmit whenever they have data Listen to the channel to see if the frame is OK Contention system 4

Channel efficiency Throughput S = GP 0 Poisson distribution: P[k] = G k e -G / k! In 2 frame interval, the number of frames generated is 2G, thus P 0 = e -2G => S = G e -2G Max. throughput S = 1/2e, when G=1/2 For slotted Aloha the vulnerable period is 1 frame period (halved), thus P 0 = e -G => S = G e -G 5

Carrier Sense Multiple Access (CSMA) 1-persistent: the station listens before sending. if the channel is busy, it waits until it idle. Transmit when the channel is idle. if collision, the station waits a random amount of time and start all over again non-persistent: If busy, the station does not continually sense. Instead, waiting for a random period, then repeating the algorithm p-persistent: It applies to slotted channel. If it is idle, it transmits with probability of p. 6

CSMA/CD Further improvement than persistent and non-persistent over Aloha, by aborting transmission as soon as stations detect a collision Contention period is 2τ where τ is propagation delay Example: for a 1 km cable, the τ is about 5 µseconds Ethernet is one of this version No MAC-sublayer protocol guarantees reliable delivery 7

Collision free protocols A bit map protocol: it is also called reservation protocol. Each contention period consists of exactly N slots for N stations. Efficiency = d/(d+1) Binary countdown: each station has a binary address, start to broadcast with the high order bit. It stops as soon as a high order position 0 is overwritten with a 1. Efficiency = d/(d+log 2 N) 8

Limited contention protocols 1/e = 0.368 Two important performance measures: delay at low load and channel efficiency at high load. At low load, contention is preferable due to low delay. At high load, reservation is preferable due to high efficiency. The adaptive tree walk protocol: dynamically allocate time slots. If a collision occurs during slot 1, the entire tree is searched, depth first to allocate all the ready stations. 9

IEEE 802.3 and Ethernet Bus Topology Whole family of 1-persistent CSMA/CD From 1-10 Mbit/s on different media Switched Ethernet 10

Ethernet MAC Frame For a 10-Mbit/s LAN Max. 2500 meters and 4 repeaters (500 m/segment) Min. allowed frame must take 51.2 µ seconds (corresponds to 64 bytes) If operating at 1 Gbit/s Max. 250 meters, and Min. frame size 640 bytes 11

IEEE 802.5 Token Ring Ring topology, suitable for real time Token holding time is 10 ms Speed 1 and 4 Mbit/s Delimiter, access control, frame control sources and destination address, checksum are the same as the 802.3 12

IEEE 802.4 Token Bus Logical ring, suitable for real time For priorities: 0, 2, 4, 6 Speed 1, 5, and 10 Mbit/s Preamble, delimiter, control, Sources and destination address, checksum are the same as the 802.3 13

IEEE 802.2 Logical link control Hide difference between the various 802 networks by providing a single format and interface to the network layer Based on HDLC, provide 3 service options as the link layer Error control using acknowledgment Flow control using a slide window All 802 LANs and MAN offer best-efforts service 14

Bridges Why using bridges? 1. Different department have different LANs initially; 2. geographical separated; 3. Accommodate the load; 4. Physical distance limit; 5. Reliability, 6. Security A bridge connecting k different LANs will have k different MAC layers and k different physical layers, one for each type. 15

Bridges from 802.x to 802.y Operation of a LAN bridge from 802.11 to 802.3. 16

Bridges from 802.x to 802.y (frame format) Problems with bridging different LANs: 1. Different frame format, 2. Different rate, 3. Different maximum frame length 17

Transparent (spanning tree) bridge Forwarding (Filtering) If destination & source address is the same, discard the frame If different, forward the frame Destination unknown, use flooding Spanning tree solve loop problem Address learning Initialise the forwarding database to empty Update the entry in the routing table (make one if it does not exit) with the frame address and arrival time Periodically scan the routing table and purge all old entries (more than a few minutes. 18

Spanning tree algorithm Root bridge RPC = 1, 4 RPC = 2, 5 RPC = 1, 4 RPC = 2, 3 RPC = 3, 4 RPC = 2, 3 RPC = 2, 5 X RPC = 3, 4 X X RPC = 4,3,4 Exchange bridge protocol data units (BPDUs) to elect root bridge with highest priority and smallest bridge identifier Each bridge selects root port with minimum root path cost (RPC) from the root to the port Bridges connected to the same segment elect a designated bridge with a port having minimum path cost from the port to the root Port identifiers are used as tiebreakers 19

Source routeing bridges Transparent bridges use only subset of the topology (the tree) Source routeing assumes that the sender knows whether or not the destination is on its own LAN. Implicit in that every machine can find the best path to the other machine Discovery frame flooding is used if destination unknown Frame explosion is solved by flooding along the spanning tree 20

Comparison of 802 bridges 21

Remote bridges It connect two or more distant LANs Put a bridge in each LAN and connect the bridge pairwise with point to point lines (such as leased telephone line) Various protocols can be used on the point to point lines (such as data link protocol) putting complete MAC frame in the payload Or strip off the MAC header and trailer at the sources and put it back at the destination 22

Repeaters, Hubs, Bridges and Switches (1/2) (a) Which device is in which layer. (b) Frames, packets, and headers. 23

Repeaters, Hubs, Bridges, Switches (2/2) (a) A hub. (b) A bridge. (c) a switch. 24

Virtual LANs (a) (b) Four physical LANs organized into two VLANs, by two bridges. The same LANs organized into two VLANs by switches. 25

The IEEE 802.1Q Standard Transition from legacy Ethernet to VLAN-aware Ethernet. The shaded symbols are VLAN aware. The empty ones are not. 26

The IEEE 802.1Q Standard (2) The 802.3 (legacy) and 802.1Q Ethernet frame formats. 27

Summary MAC protocols and sublayers, LANs: Ethernet, Token ring Token bus Logic Link Control (LLC) LAN interconnections: Transparent (spanning tree) bridge Source routing bridge VLAN 28