06/02/ Local & Metropolitan Area Networks. Overview. Medium Access Sublayer (1) ACOE322

Similar documents
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Controlled Random Access Methods

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

IEEE Wireless LAN Standard. Updated: 5/10/2011

Communications and Computer Networks

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

IEEE 802 Protocol Layers. IEEE Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

Ring Local Area Network. Ring LANs

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Random Access Protocols

Real-Time (Paradigms) (51)

Networking Test 4 Study Guide

Based on Computer Networking, 4 th Edition by Kurose and Ross

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Introduction to Ethernet

Data Link Protocols. TCP/IP Suite and OSI Reference Model

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

RTT 60.5 msec receiver window size: 32 KB

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Data Communication and Computer Network

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

CSE 3461 / 5461: Computer Networking & Internet Technologies

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

High-Level Data Link Control

CSMA/CA. Information Networks p. 1

Communication Networks. MAP-TELE 2011/12 José Ruela

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

CSE 123A Computer Networks

WAN Data Link Protocols

Performance Evaluation of Wired and Wireless Local Area Networks

IEEE WIRELESS LAN STANDARD

Computer Networks Vs. Distributed Systems

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting

11/22/

Chapter 7 Low-Speed Wireless Local Area Networks

The OSI and TCP/IP Models. Lesson 2

- Hubs vs. Switches vs. Routers -

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Ethernet. Ethernet. Network Devices

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Module 15: Network Structures

RARP: Reverse Address Resolution Protocol

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Ethernet, VLAN, Ethernet Carrier Grade

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

2 Basic Concepts. Contents

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

ELEC3030 Computer Networks

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

EPL 657 Wireless Networks

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

524 Computer Networks

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

How To Communicate With A Token Ring Network (Dihon)

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Chapter 14: Distributed Operating Systems

Data Link Layer. Page 1. Ethernet

Token-ring local area network management


How To Understand The Layered Architecture Of A Network

CS263: Wireless Communications and Sensor Networks

Data Communication Networks

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Lecture 7 Multiple Access Protocols and Wireless

Protocols and Architecture. Protocol Architecture.

Chapter 16: Distributed Operating Systems

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. By Hardeep Singh

Objectives of Lecture. Network Architecture. Protocols. Contents

UPPER LAYER SWITCHING

Algorithms for Interference Sensing in Optical CDMA Networks

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Communication Systems Internetworking (Bridges & Co)

MANAGEMENT INFORMATION SYSTEMS 8/E

Fiber Distributed Data Interface

Wiereless LAN

IT Data Communication and Networks (Optional)

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Network Topologies. Network Topologies

Computer Networks: LANs, WANs The Internet

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

Lesson 2-3: Ethernet Basics

Transcription:

1 Local & Metropolitan Area Networks ACOE322 Lecture 2 Medium Access Control and Logical Link Control 1 Overview The architecture of a LAN is best described in terms of a layering of protocols that organize the basic functions of a LAN This section opens with a description of the standardized protocol architecture for LANs, which includes Physical layer Medium Access Control (MAC) layer Logical Link Control (LLC) layer Physical layer includes topology and transmission medium (covered in lecture 1) This section provides an overview of MAC and LLC layers 2 Medium Access Sublayer (1) Network Layer Data Link Layer Logical Link Control Sublayer Medium Access Sublayer Physical Layer 3 06/02/2006 1

2 Medium Access Sublayer (2) Medium access (MAC) sublayer is not important on point-to-point links The MAC sublayer is only used in broadcast or shared channel networks MAC protocols enable two stations (or nodes) using a shared communication resource to establish, maintain and terminate a connection. Examples: Satellite, Ethernet, Cellular 4 IEEE 802 Standard (1) Data Link Layer Physical Layer LLC Sublayer MAC Sublayer Physical Layer Ethernet IEEE 802.3 (CSMA/CD) IEEE 802.4 Token bus IEEE 802.2 IEEE 802.5 Token Ring FDDI OSI Layers LAN Specification 5 IEEE 802 standard (2) IEEE 802 standard defines: Physical layer protocol Data link layer protocol Medium Access (MAC) Sublayer Logical Link Control (LLC) Sublayer 6 06/02/2006 2

3 IEEE 802 standard 802.2: Logical Link Control (LLC) explained in this section 802.3: CSMA/CD (Ethernet) explained in this section 802.5: Token Ring explained in lecture 3 802.11: Wireless LANs explained in lecture 3 7 IEEE 802 vs OSI model 8 802 Layers functions Physical Encoding/decoding Preamble generation/removal Bit transmission/reception Transmission medium and topology Logical Link Control Interface to higher levels Flow and error control Medium Access Control Data assembly and dismantle into frames Govern access to LAN transmission medium 9 06/02/2006 3

4 Scope of LAN protocols Consider two stations that communicate via a shared medium LAN. Higher layers (above LLC) provide end-to-end services between the stations Below the LLC layer, the MAC provides the necessary logic for gaining access to the network 10 Logical Link Control (LLC) The LLC layer for LANs is concerned with the transmission of a link-level protocol data unit (PDU) between two stations, without the necessity of an intermediate switching node It has two characteristics: It must support the multi-access, shared medium nature of the link It is relieved from some details of link access by the MAC layer 11 LLC Services Unacknowledged connectionless service Datagram-style Does not involve any flow and error control mechanisms Data delivery is not guaranteed Connection mode service A logical connection is set up between two stations Flow and error control are provided Acknowledged connectionless service A cross between the previous services Datagrams are to be acknowledged No prior logical connection is set up 12 06/02/2006 4

5 Medium Access Control (1) Assembly of data into frame with address and error detection fields Disassembly of frame and performing of Address recognition Error detection Govern access to transmission medium Not found in traditional layer 2 data link control For the same LLC, several MAC options may be available 13 Medium Access Control (2) All LANs and MANs consist of a collection of devices that must share the network s transmission capacity Some means of controlling access to the transmission medium is needed for efficient use of that capacity. This is the function of a Medium Access Control (MAC) Protocol. The key parameters in any MAC technique are where and how. Where, refers to whether control info is exercised in a centralized or distributed fashion. Centralized: a controller has the authority to grant access to the network Distributed: the stations collectively perform a MAC function to determine dynamically the order in which stations transmit How, is contrained by the topology and is a trade-off among competing factors, such as cost, performance and complexity 14 LAN Protocols in Context 15 06/02/2006 5

6 Generic MAC frame format MAC control: contains control info for the functioning of the MAC protocol, eg priority level Destination MAC address: the destination physical attachment point on the LAN for this frame Source MAC address: the source physical attachment point on the LAN for this frame LLC: The LLC data from the next higher layer CRC: Cyclic Redundancy Check field, used to check if a transmission error has occurred 16 MAC techniques Synchronous A specific capacity is dedicated to a connection Same approach as in circuit-switching FDM or TDM, so not optimal for LANs/MANs because the needs of the stations are unpredictable Asynchronous Capacity is allocated in a dynamic fashion, in response to demand Subdivided into three categories Round Robin Reservation Contention 17 Asynchronous MAC techniques Round Robin Each station in turn is granted the right to transmit After each station finishes transmitting, it passes the right to transmit to the next station in logical sequence Efficient technique when many stations have data to transmit over an extended period of time Reservation For stream traffic (voice, bulk file transfer etc) Time on the medium is divided into slots, like synchronous TDM A station whishing to transmit reserves slots for an extended period Contention For bursty traffic (short, sporadic transmissions such as interactive terminal-host traffic) No control is exercised to determine whose turn it is Simple to implement and efficient for light loads 18 06/02/2006 6

7 Medium Access Control Methods The methods used for Medium Access Control are: Carrier-sense multiple-access with collision detection (CSMA/CD) for bus topologies Control token or Token Passing for bus and ring topologies 19 CSMA/CD CSMA/CD is used only in bus type networks, where a number of nodes share a common communication channel (wire) known as the bus. CSMA/CD is used in traditional Ethernet Ethernet will be covered in detail in future lectures 20 CSMA/CD Carrier Sense A B C D Multiple Access A B C D Collision A B C D Collision Collision Detection (Backoff Algorithm) A B C D JAM JAM JAM JAM JAM JAM Carrier sense multiple access collision detect (CSMA/CD) 21 06/02/2006 7

8 CSMA/CD operation The basic operation of CSMA/CD is as follows: 1. To transmit data, the source station assembles a packet comprising of the destination address, the data and control info 2. The source station listens to the cable to determine if the bus is currently in use. If so, it waits until the bus is free, else it transmits the packet. This operation is known as carrier sensing. 3. During transmission, the source station continues to listen to the cable to detect if another station has also initiated a transmission thus causing a collision. This process is known as collision detection. 4. If a collision is detected then, to ensure all stations are aware of the collision, the source station transmits a random bit pattern known as the jam sequence. 5. Stations involved in a collision then back off for a random period before retrying for packet transmission. 22 CSMA/CD procedure Sense the channel If idle, transmit immediately If busy, wait until the channel becomes idle Collision detection Abort a transmission immediately if a collision is detected Try again later after waiting a random amount of time 23 Collision detection time How long does it take to realize there has been a collision? Worst case: 2 x end-to-end propagation delay packet Station A t prop Station B 24 06/02/2006 8

9 Control Token or Token Passing Another way of controlling access to a shared transmission medium is by a control token (Token Passing) The Control Token technique uses a control or permission token to share the communication resource between a number of nodes. The technique can be applied to both bus and ring network topologies. This token is passed from one station to another according to a defined set of rules A station may transmit a frame only when it has possession of the token and after it has transmitted the frame, it passes the token on, to allow another station to access the transmission medium 25 Control Token operation (1) Whether using a ring or bus topology, a logical ring is established which links all the nodes using the physical medium (see next two slides) A single control (permission) token is created at one of the nodes The token is passed from node to node around the logical ring until it arrives at a node waiting to send a frame The node captures the token and transmits the frame Upon completing transmission, the node releases the token to the next node in the logical ring 26 Control Token operation (2) Assume DTE A wishes to send a frame to DTE C token A D C DTE A waits for receipt of control token from its upstream neighbor B D A frame B C DTE A transmits frame on to the ring. DTE C copies the frame addressed to it. Frame continues around the ring. 27 06/02/2006 9

10 Control Token operation (3) frame D A B C DTE A awaits receipt of start of frame but does not repeat the frame, thereby removing it Either: A token D B C When last bit of frame has been received DTE A generates and passes on the token: it then processes the response bits at the tail of the frame Or: A token D B C When last bit of frame has been transmitted by DTE A it passes on the token early release 28 Sending frames or Control Token Sending frames 1. Source node monitors all frames in ring. 2. If it detects frames with its own source address it removes them from the ring 3. If it detects a corrupted frame, it removes it from the ring and retransmits a new one Sending Control Token 1. When source node finishes transmitting, it sends a token to its designated successor and it is acknowledged 2. If the successor does not respond, it then sends a whofollows-then message. If it receives a reply, it send a token 3. If it receives no reply, it sends is anybody there? message. If it receives a reply, it sends a token 4. If it does not receive any reply, it then stops transmitting but continues to listen. 29 Token passing network A token always circulates around a ring net. A user grabs a token to transmit data 30 06/02/2006 10

11 Control Token procedure 31 LAN addressing Communication involves three agents: Processes stations networks The transfer of data from one process to another involves getting the data to the station in which the destination process resides, and then getting it to the intended process within the computer The above suggest the need for two levels of addressing MAC address LLC address 32 User data and LAN/MAN protocol control info LLC user data (IP datagram) are passed down to LLC which appends a header, to make the LLC PDU The LLC PDU is passed to the MAC entity, which in turn appends a header and a trailer, to make the MAC frame 33 06/02/2006 11

12 Levels of addressing MAC address Identifies a physical interface from the station to the LAN There is one to one relationship between stations and physical addresses LLC address Identifies an LLC user The LLC address (LLC SAP) is associated with a particular user within a station LLC SAP may refer to a process executing on a station or to a hardware port 34 Review Questions Explain the difference between MAC and LLC protocols with respect to their functionality. Describe the techniques used in implementing MAC protocols. Which are the asynchronous MAC techniques and for which type if traffic are they best suited? Which methods are used for Medium Access Control and for which type of network topologies are they used? What is meant by CSMA/CD? Explain the operation of CSMA/CD. Explain the terms of collision detection and jam sequence. What is meant by Control Token? Explain by means of appropriate diagrams the operation of Control Token. In the context of Control Token MAC methods, which steps does the source station take when sending frames or the control token on a ring network topology? 35 References W. Stalling, Local and Metropolitan Area Networks, 6 th edition, Prentice Hall, 2000 B.A. Forouzan, Data Communications and Networking, 3rd edition, McGraw-Hill, 2004 F. Halsall, Data Communications, Computer Networks and Open Systems, 4 th edition, Addison Wesley, 1995 W. Stallings, Data and Computer Communications, 7 th edition, Prentice Hall, 2004 36 06/02/2006 12