Ethernet. Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff

Similar documents
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

RTT 60.5 msec receiver window size: 32 KB

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Based on Computer Networking, 4 th Edition by Kurose and Ross

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Random Access Protocols

CSE 123A Computer Networks

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Introduction to Ethernet

Ethernet, VLAN, Ethernet Carrier Grade

RETI DI TELECOMUNICAZIONI

Controlled Random Access Methods

Data Link Layer. Page 1. Ethernet

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

CSMA/CA. Information Networks p. 1

Performance Evaluation of Wired and Wireless Local Area Networks

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC

First Semester Examinations 2011/12 INTERNET PRINCIPLES

11/22/

CS263: Wireless Communications and Sensor Networks

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Lesson 2-3: Ethernet Basics

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

How To Make A Multi-User Communication Efficient

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EPL 657 Wireless Networks

Wiereless LAN

First Midterm for ECE374 03/09/12 Solution!!

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Lecture 7 Multiple Access Protocols and Wireless

ECE 333: Introduction to Communication Networks Fall 2002

Wireless LAN Protocol CS 571 Fall Kenneth L. Calvert All rights reserved

- Hubs vs. Switches vs. Routers -

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Written examination in Computer Networks

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Real-Time (Paradigms) (51)

... neither PCF nor CA used in practice

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Gigabit Ethernet: Architectural Design and Issues

IEEE Technical Tutorial. Introduction. IEEE Architecture

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

Selecting a Web Server Connection Rate Gilbert Held

Level 2 Routing: LAN Bridges and Switches

Data Communication and Computer Network

Ethernet. Ethernet. Network Devices

LAN / WAN Technologies

Data Communication Networks

Network Categories. Network Types for the Local Range. Ethernet

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Communication Systems Internetworking (Bridges & Co)

Wireless LAN Concepts

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet

IT4405 Computer Networks (Compulsory)

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Algorithms for Interference Sensing in Optical CDMA Networks

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF

Network Layer: Network Layer and IP Protocol

Welcome to the Introduction to Controller Area Network web seminar My name is William Stuart, and I am a Applications Engineer for the Automotive

Final for ECE374 05/06/13 Solution!!

Module 15: Network Structures

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Protocols and Architecture. Protocol Architecture.

ECE 428 Computer Networks and Security

Chapter 7 Low-Speed Wireless Local Area Networks

A Technical Tutorial on the IEEE Protocol

Local-Area Network -LAN

Lecture 17: Wireless Networking"

Candidates should attempt FOUR questions. All questions carry 25 marks.

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Computer Networks III

WIRELESS ETHERNET (IEEE )

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Adaptive DCF of MAC for VoIP services using IEEE networks

DATA COMMUNICATION AND NETWORKS

Transcription:

Ethernet Outline Multiple Access and Ethernet Intro Ethernet Framing CSMA/CD protocol Exponential backoff

Shared Access Networks are Different Shared Access Networks assume multiple nodes on the same physical link Bus, ring and wireless structures Transmission sent by one node is received by all others No intermediate switches Need methods for moderating access (MAC protocols) Fairness Performance How can this be done? HPCN (EC 836) 2

Multiple Access Methods Fixed assignment Partition channel so each node gets a slice of the bandwidth Essentially circuit switching thus inefficient Examples: TDMA, FDMA, CDMA (all used in wireless/cellular environments) Contention-based Nodes contends equally for bandwidth and recover from collisions Examples: Aloha, Ethernet Token-based or reservation-based Take turns using the channel Examples: Token ring HPCN (EC 836) 3

A Quick Word about Token Ring Developed by IBM in early 80 s as a new LAN architecture Consists of nodes connected into a ring (typically via concentrators) Special message called a token is passed around the ring When nodes gets the token it can transmit for a limited time Every node gets an equal opportunity to send IEEE 802.5 standard for Token Ring Designed for predictability, fairness and reliability Originally designed to run at either 4Mbps and 16Mbps Still used and sold but beaten out by Ethernet HPCN (EC 836) 4

Our Focus is Ethernet History Developed by Bob Metcalfe and others at Xerox PARC in mid-1970s Roots in Aloha packet-radio network Standardized by Xerox, DEC, and Intel in 1978 LAN standards define MAC and physical layer connectivity IEEE 802.3 (CSMA/CD - Ethernet) standard originally 2Mbps IEEE 802.3u standard for 100Mbps Ethernet IEEE 802.3z standard for 1,000Mbps Ethernet CSMA/CD: Ethernet s Media Access Control (MAC) policy CS = carrier sense Send only if medium is idle MA = multiple access CD = collision detection Stop sending immediately if collision is detected HPCN (EC 836) 5

Ethernet Overview Most popular packet-switched LAN technology Bandwidths: 10Mbps, 100Mbps, 1Gbps Max bus length: 2500m 500m segments with 4 repeaters Bus and Star topologies are used to connect hosts Hosts attach to network via Ethernet transceiver or hub or switch Detects line state and sends/receives signals Hubs are used to facilitate shared connections All hosts on an Ethernet are competing for access to the medium Switches break this model Problem: Distributed algorithm that provides fair access HPCN (EC 836) 6

Ethernet Overview (contd.) Ethernet by definition is a broadcast protocol Any signal can be received by all hosts Switching enables individual hosts to communicate Network layer packets are transmitted over an Ethernet by encapsulating Frame Format 64 48 48 16 32 Preamble Dest addr Src addr Type Body CRC HPCN (EC 836) 7

Ethernet Frames Preamble is a sequence of 7 bytes, each set to 10101010 Used to synchronize receiver before actual data is sent Addresses unique, 48-bit unicast address assigned to each adapter example: 8:0:e4:b1:2 Each manufacturer gets their own address range broadcast: all 1s multicast: first bit is 1 Type field is a demultiplexing key used to determine which higher level protocol the frame should be delivered to Body can contain up to 1500 bytes of data HPCN (EC 836) 8

A Quick Word about Aloha Networks Developed in late 60 s by Norm Abramson at Univ. of Hawaii (!!) for use with packet radio systems Any station can send data at any time Receiver sends an ACK for data Timeout for ACK signals that there was a collision What happens if timeout is poorly timed? If there is a collision, sender will resend data after a random backoff Utilization (fraction of transmitted frames avoiding collision for N nodes) was pretty bad Max utilization = 18% Slotted Aloha (dividing transmit time into windows) helped Max utilization increased to 36% HPCN (EC 836) 9

Ethernet s MAC Algorithm In Aloha, decisions to transmit are made without paying attention to what other nodes might be doing Ethernet uses CSMA/CD listens to line before/during sending If line is idle (no carrier sensed) send packet immediately upper bound message size of 1500 bytes must wait 9.6us between back-to-back frames If line is busy (carrier sensed) wait until idle and transmit packet immediately called 1-persistent sending If collision detected Stop sending and jam signal Try again later HPCN (EC 836) 10

State Diagram for CSMA/CD Packet? No Sense Carrier Send Detect Collision Discard Packet attempts < 16 attempts == 16 Yes Jam channel b=calcbackoff(); wait(b); attempts++; HPCN (EC 836) 11

Collisions Collisions are caused when two adaptors transmit at the same time (adaptors sense collision based on voltage differences) Both found line to be idle Both had been waiting to for a busy line to become idle A starts at time 0 A B A B Message almost there at time T when B starts collision! How can we be sure A knows about the collision? HPCN (EC 836) 12

Collision Detection How can A know that a collision has taken place? There must be a mechanism to insure retransmission on collision A s message reaches B at time T B s message reaches A at time 2T So, A must still be transmitting at 2T IEEE 802.3 specifies max value of 2T to be 51.2us This relates to maximum distance of 2500m between hosts At 10Mbps it takes 0.1us to transmit one bit so 512 bits (64B) take 51.2us to send So, Ethernet frames must be at least 64B long 14B header, 46B data, 4B CRC Padding is used if data is less than 46B Send jamming signal after collision is detected to insure all hosts see collision 48 bit signal HPCN (EC 836) 13

Collision Detection contd. time = 0 A B time = T A B time = 2T A B HPCN (EC 836) 14

Exponential Backoff If a collision is detected, delay and try again Delay time is selected using binary exponential backoff 1st time: choose K from {0,1} then delay = K * 51.2us 2nd time: choose K from {0,1,2,3} then delay = K * 51.2us nth time: delay = K x 51.2us, for K=0..2 n 1 Note max value for k = 1023 give up after several tries (usually 16) Report transmit error to host If delay were not random, then there is a chance that sources would retransmit in lock step Why not just choose from small set for K This works fine for a small number of hosts Large number of nodes would result in more collisions HPCN (EC 836) 15

MAC Algorithm from the Receiver Side Senders handle all access control Receivers simply read frames with acceptable address Address to host Address to broadcast Address to multicast to which host belongs All frames if host is in promiscuous mode HPCN (EC 836) 16

Fast and Gigabit Ethernet Fast Ethernet (100Mbps) has technology very similar to 10Mbps Ethernet Uses different physical layer encoding (4B5B) Many NIC s are 10/100 capable Can be used at either speed Gigabit Ethernet (1,000Mbps) Compatible with lower speeds Uses standard framing and CSMA/CD algorithm Distances are severely limited Typically used for backbones and inter-router connectivity Becoming cost competitive How much of this bandwidth is realizable? HPCN (EC 836) 17

Experiences with Ethernet Ethernets work best under light loads Utilization over 30% is considered heavy Network capacity is wasted by collisions Most networks are limited to about 200 hosts Specification allows for up to 1024 Most networks are much shorter 5 to 10 microsecond RTT Transport level flow control helps reduce load (number of back to back packets) Ethernet is inexpensive, fast and easy to administer! HPCN (EC 836) 18

Ethernet Problems Ethernet s peak utilization is pretty low (like Aloha) Peak throughput worst with More hosts More collisions needed to identify single sender Smaller packet sizes More frequent arbitration Longer links Collisions take longer to observe, more wasted bandwidth Efficiency is improved by avoiding these conditions HPCN (EC 836) 19

Why did Ethernet Win? There are LOTS of LAN protocols Price Performance Availability Ease of use Scalability Tomorrow we will talk about physical layer stuff HPCN (EC 836) 20