Presentation is loading. Please wait.

Presentation is loading. Please wait.

C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.

Similar presentations


Presentation on theme: "C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use."— Presentation transcript:

1 C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.

2 OSI M ODEL AND P ROJECT 802 2

3 T HE C HANNEL A LLOCATION P ROBLEM Static Channel Allocation in LANs and MANs FDM: small and constant users, heavy load of traffic of each. TDM:same problem. Poor performance. None of the static channel allocation methods work well with bursty traffic. Dynamic Channel Allocation in LANs and MANs 3

4 P URE ALOHA In pure ALOHA, frames are transmitted at completely arbitrary times. 4 Multiple Access Protocols

5 P URE ALOHA (2) Vulnerable period for the shaded frame. 5

6 SLOTTED ALOHA Time in uniform slots equal to frame transmission time Need central clock (or other sync mechanism) Transmission begins at slot boundary Frames either miss or overlap totally Max utilization 36.8% 6

7 RELATIVE FORMULAS FOR THE ALOHA 7 Throughput or Channel Utilization Probability of collisionProbability of success Pure ALO HA Slott ed ALO HA

8 PURE ALOHA AND SLOTTED ALOHA Throughput versus offered traffic for ALOHA systems. 8

9 P ERSISTENT AND N ONPERSISTENT CSMA All stations know that a transmission has started almost immediately First listen for clear medium (carrier sense) If medium idle, transmit with a probability. If two stations start at the same instant, collision Propagation time is much less than transmission time Wait reasonable time (round trip plus ACK contention) No ACK then retransmit 9

10 P ERSISTENT AND N ONPERSISTENT CSMA Comparison of the channel utilization versus load for various random access protocols. 10

11 CSMA/CD (WITH COLLISION DETECTION) If collision detected, jam then cease transmission rather than finish transmitting their frame After jam, wait random time then start again Half-duplex system Save time and bandwidth. Basis of Ethernet LAN. 11

12 CSMA/CD OPERATION 12

13 T OKEN R ING (802.5) MAC protocol Small frame (token) circulates when idle Station waits for token Changes one bit in token to make it SOF for data frame Append rest of data frame Frame makes round trip and is absorbed by transmitting station Station then inserts new token when transmission has finished and leading edge of returning frame arrives Under light loads, some inefficiency Under heavy loads, round robin makes efficiency and fair. 13

14 T OKEN R ING O PERATION 14

15 FDDI MAC P ROTOCOL Fiber Distributed Data Interface As for 802.5 except: Station seizes token by aborting token transmission Once token captured, one or more data frames transmitted New token released as soon as transmission finished 15

16 E THERNET Ethernet Cabling Manchester Encoding The Ethernet MAC Sublayer Protocol The Binary Exponential Backoff Algorithm Ethernet Performance Switched Ethernet Fast Ethernet Gigabit Ethernet IEEE 802.2: Logical Link Control 16

17 13.17 Ethernet evolution through four generations

18 13.18 Figure 13.8 Categories of Standard Ethernet

19 E THERNET C ABLING The most common kinds of Ethernet cabling. 19

20 13.20 Figure 13.9 Encoding in a Standard Ethernet implementation

21 13.21 Figure 13.10 10Base5 implementation

22 13.22 Figure 13.11 10Base2 implementation

23 13.23 Figure 13.12 10Base-T implementation

24 13.24 Figure 13.13 10Base-F implementation

25 13.25 Table 13.1 Summary of Standard Ethernet implementations

26 ETHERNET TOPOLOGY Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented. 26

27 B ASEBAND C ONFIGURATION The size limitation is usually solved by using repeaters to divide the medium into smaller segments Repeaters relay digital signals in both directions, making the segments appear like one medium As repeaters recover the digital signal, they remove any attenuation 27

28 13.28 Figure 13.15 A network with and without a bridge

29 13.29 Figure 13.16 Collision domains in an unbridged network and a bridged network

30 13.30 Figure 13.17 Switched Ethernet

31 13.31 Figure 13.18 Full-duplex switched Ethernet

32 13.32 13-4 FAST ETHERNET Fast Ethernet was designed to compete with LAN protocols such as FDDI or Fiber Channel. IEEE created Fast Ethernet under the name 802.3u. Fast Ethernet is backward-compatible with Standard Ethernet, but it can transmit data 10 times faster at a rate of 100 Mbps. MAC Sublayer Physical Layer Topics discussed in this section:

33 13.33 Figure 13.19 Fast Ethernet topology

34 13.34 Figure 13.20 Fast Ethernet implementations

35 13.35 Figure 13.21 Encoding for Fast Ethernet implementation

36 13.36 Table 13.2 Summary of Fast Ethernet implementations

37 13.37 13-5 GIGABIT ETHERNET The need for an even higher data rate resulted in the design of the Gigabit Ethernet protocol (1000 Mbps). The IEEE committee calls the standard 802.3z. MAC Sublayer Physical Layer Ten-Gigabit Ethernet Topics discussed in this section:

38 13.38 In the full-duplex mode of Gigabit Ethernet, there is no collision; the maximum length of the cable is determined by the signal attenuation in the cable. Note

39 13.39 Figure 13.22 Topologies of Gigabit Ethernet

40 13.40 Figure 13.23 Gigabit Ethernet implementations

41 13.41 Figure 13.24 Encoding in Gigabit Ethernet implementations

42 13.42 Table 13.3 Summary of Gigabit Ethernet implementations

43 13.43 Table 13.4 Summary of Ten-Gigabit Ethernet implementations

44 S WITCHED E THERNET A simple example of switched Ethernet. 44

45 FAST ETHERNET Fast Ethernet was designed to compete with LAN protocols such as FDDI or Fiber Channel. IEEE created Fast Ethernet under the name 802.3u. Fast Ethernet is backward-compatible with Standard Ethernet, but it can transmit data 10 times faster at a rate of 100 Mbps. 45

46 Fast Ethernet topology 46

47 Fast Ethernet implementations 47

48 13.48 GIGABIT ETHERNET The need for an even higher data rate resulted in the design of the Gigabit Ethernet protocol (1000 Mbps). The IEEE committee calls the standard 802.3z.

49 G IGABIT E THERNET (a) A two-station Ethernet. (b) A multistation Ethernet. 49

50 G IGABIT E THERNET (2) 50 Gigabit Ethernet - Differences zCarrier extension zAt least 4096 bit-times long (512 for 10/100) zFrame bursting extended to 200m. zNew coding

51 Summary of Ten-Gigabit Ethernet implementations 51

52 IEEE standard for LANs 52

53 IEEE 802.2: L OGICAL L INK C ONTROL (a) Position of LLC. (b) Protocol formats. 53

54 54 E THERNET MAC S UBLAYER P ROTOCOL WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998

55 55 PDU FORMAT WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998

56 M INIMUM AND MAXIMUM LENGTH 56

57 13.57 Example of an Ethernet address in hexadecimal notation

58 E THERNET P ERFORMANCE Efficiency of Ethernet at 10 Mbps with 512- bit slot times. 58

59 13.59 Figure 13.2 HDLC frame compared with LLC and MAC frames

60 LAN T RANSMISSION T ECHNOLOGIES Ethernet 10 Mbit/s Token Ring 4/16 Mbit/s Fast Ethernet 100 Mbit/s FDDI 100 Mbit/s Gigabit Ethernet 1 Gbit/s ATM 25 Mbit/s to 2.4 Gbit/s Only Ethernet versions are growing 60


Download ppt "C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use."

Similar presentations


Ads by Google