EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
5: DataLink Layer5-1 Mac Addressing, Ethernet, and Interconnections.
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
5-1 Link Layer: Introduction Some terminology: r hosts and routers are nodes r communication channels that connect adjacent nodes along communication path.
5: DataLink Layer5a-1 MAC Sublayer. 5: DataLink Layer5a-2 Multiple Access Links and Protocols Two types of “links”: r point-to-point m PPP for dial-up.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
1 Last class r Random Access Protocols m Slotted Aloha m Aloha m CSMA/CD m “Taking Turns” Protocols r Link-Layer Addressing Today r Ethernet, Hubs and.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Broadcast network access control Some slides used.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r LAN addresses and ARP r Ethernet Some slides are in courtesy of J.
Introduction 1 Lecture 25 Link Layer (Ethernet, Switch) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Computer Networking Lecture 5 – Ethernet. Lecture 5: MAC Protocols: A Taxonomy Three broad classes: Channel partitioning Divide channel.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Part 3: MAC Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Lecture 17 Ethernet r Widely deployed because: m First LAN technology m Simpler and less expensive than token LANs and ATM m Kept up with the speed race:
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link Layer multiple.
Medium Access Control NWEN302 Computer Network Design.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Multiple Access Readings: Kurose & Ross, 5.3, 5.5.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
5: DataLink Layer5-1 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire frame r If channel sensed.
LANs : Aloha/CSMA , summary
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r link layer services r error detection, correction r multiple access protocols and LANs.
Link Layer MAC Dr. Mozafar Bag-Mohammadi University of Ilam.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
5-1 Last time □ Multiple access protocols ♦ Channel partitioning MAC protocols TDMA, FDMA ♦ Random access MAC protocols Slotted Aloha, Pure Aloha, CSMA,
Link Layer 5.1 Introduction and services
Getting Connected (Chapter 2 Part 3)
Chapter 5 Link Layer and LANs
High Speed LANs – Ethernet and Token Ring
CS 457 – Lecture 6 Ethernet Spring 2012.
Data Link Issues Relates to Lab 2.
Services of DLL Framing Link access Reliable delivery
Multiple access.
COMP/ELEC 429/556 Introduction to Computer Networks
Getting Connected (Chapter 2 Part 3)
Overview Jaringan Komputer (3)
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
EE122: Multi-Access Aloha, Ethernet,
Link Layer: Multiple Access
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Presentation transcript:

EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)

High Level View  Goal: share a communication medium among multiple hosts connected to it  Problem: arbitrate between connected hosts  Solution goals: -High resource utilization -Avoid starvation -Simplicity (non-decentralized algorithms)

Medium Access Protocols  Channel partitioning -Divide channel into smaller “pieces” (e.g., time slots, frequency) -Allocate a piece to node for exclusive use  Random access -Allow collisions -“recover” from collisions  “Taking-turns” -Tightly coordinate shared access to avoid collisions

Random Access protocols  When node has packet to send -Transmit at full channel data rate R. -No a priori coordination among nodes  Two or more transmitting nodes -> “collision”,  Random access MAC protocol specifies: -How to detect collisions -How to recover from collisions  Examples of random access MAC protocols: -Slotted ALOHA -CSMA and CSMA/CD

Slotted Aloha  Time is divided into equal size slots (= packet transmission time)  Node with new arriving pkt: transmit at beginning of next slot  If collision: retransmit pkt in future slots with probability p, until successful. Success (S), Collision (C), Empty (E) slots

Slotted Aloha Efficiency  What is the maximum fraction of successful transmissions?  Suppose N stations have packets to send -Each transmits in slot with probability p -Prob. successful transmission S is (very approximated analysis!): by a particular node: S = p (1-p) (N-1) by any of N nodes S = Prob (only one transmits) = N p (1-p) (N-1) <= 1/e = 0.37

CSMA: Carrier Sense Multiple Access  CS (Carrier Sense) means that each node can distinguish between an idle and a busy link  Sender operations: -If channel sensed idle: transmit entire packet -If channel sensed busy, defer transmission Persistent CSMA: retry immediately with probability p when channel becomes idle Non-persistent CSMA: retry after a random time interval

CSMA collisions Collisions can occur: propagation delay means two nodes may not hear each other’s transmission Collision: entire packet transmission time wasted spatial layout of nodes along ethernet Note: role of distance and propagation delay in determining collision prob.

CSMA/CD (Collision Detection)  Collisions detected within short time  Colliding transmissions aborted, reducing channel wastage  Easy in wired LANs: measure signal strengths, compare transmitted, received signals  Difficult in wireless LANs

CSMA/CD collision detection

Overview  Ethernet  Wireless (802.11)

Ethernet  Dominant LAN technology  CSMA/CD protocol  Cheap $20 for 100Mbs!

Ethernet Frame Structure  Sending adapter encapsulates IP datagram  Preamble: -7 bytes with pattern followed by one byte with pattern Used to synchronize receiver, sender clock rates

Ethernet Frame Structure (more)  Addresses: 6 bytes, frame is received by all adapters on a LAN and dropped if address does not match  Type: 2 bytes, indicates the higher layer protocol -E.g., IP, Novell IPX, AppleTalk  CRC: 4 bytes, checked at receiver, if error is detected, the frame is simply dropped  Data payload: maximum 1500 bytes, minimum 46 bytes

Ethernet’s CSMA/CD  Sense channel, if idle -If detect another transmission Abort, send jam signal Delay, and try again -Else Send frame  Receiver accepts: -Frames addressed to its own address -Frames addressed to the broadcast address (broadcast) -Frames addressed to a multicast address, if it was instructed to listen to that address -All frames (promiscuous mode)

Ethernet’s CSMA/CD (more)  Jam signal: make sure all other transmitters are aware of collision; 48 bits;  Exponential back-off -Goal: adapt retransmission attempts to estimated current load -Heavy load: random wait will be longer -First collision: choose K from {0,1}; delay is K x 512 bit transmission times -After second collision: choose K from {0,1,2,3}… -After ten or more collisions, choose K from {0,1,2,3,4,…,1023}

Minimum Packet Size  Why put a minimum packet size?  Give a host enough time to detect collisions  In Ethernet, minimum packet size = 64 bytes (two 6-byte addresses, 2-byte type, 4-byte CRC, and 46 bytes of data)  If host has less than 46 bytes to send, the adaptor pads (adds) bytes to make it 46 bytes  What is the relationship between minimum packet size and the length of the LAN?

Minimum Packet Size (more) propagation delay (d) a) Time = t; Host 1 starts to send frame Host 1Host 2 propagation delay (d) Host 1Host 2 b) Time = t + d; Host 2 starts to send a frame just before it hears from host 1’s frame propagation delay (d) Host 1Host 2 c) Time = t + 2*d; Host 1 hears Host 2’s frame  detects collision LAN length = (min_frame_size)*(light_speed)/(2*bandwidth) = = (8*64b)*(2.5*10 8 mps)/(2*10 7 bps) = 6400m approx

Ethernet Technologies: 10Base2  10: 10Mbps; 2: under 200 meters max cable length  Thin coaxial cable in a bus topology  Repeaters used to connect up to multiple segments  Repeater repeats bits it hears on one interface to its other interfaces: physical layer device only!

10BaseT and 100BaseT  10/100 Mbps rate; latter called “fast ethernet”  T stands for Twisted Pair  Hub to which nodes are connected by twisted pair, thus “star topology”  CSMA/CD implemented at hub

10BaseT and 100BaseT (more)  Max distance from node to Hub is 100 meters  Hub can disconnect “jabbering adapter  Hub can gather monitoring information, statistics for display to LAN administrators

Gbit Ethernet  Use standard Ethernet frame format  Allows for point-to-point links and shared broadcast channels  In shared mode, CSMA/CD is used; short distances between nodes to be efficient  Uses hubs, called here “Buffered Distributors”  Full-Duplex at 1 Gbps for point-to-point links

Interconnecting LANs  Why not just one big LAN? -Limited amount of supportable traffic: on single LAN, all stations must share bandwidth -Limited length -Large “collision domain” (can collide with many stations)

Overview  Ethernet  Wireless (802.11)

Wireless (802.11)  Designed for use in limited geographical area (i.e., couple of hundreds of meters)  Designed for three physical media (run at either 1Mbps or 2 Mbps) -Two based on spread spectrum radio -One based on diffused infrared

Physical Link  Frequency hoping -Transmit the signal over multiple frequencies -The sequence of frequencies is pseudo-random, i.e., both sender and receiver use the same algorithm to generate their sequences  Direct sequence -Represent each bit by multiple (e.g., n) bits in a frame; XOR signal with a pseudo-random generated sequence with a frequency n times higher  Infrared signal -Sender and receiver do not need a clear line of sight -Limited range; order of meters

Collision Avoidance: The Problems  Reachability is not transitive: if A can reach C, and C can reach D, it doesn’t necessary mean that A can reach D  Hidden nodes: A and C send a packet to B; neither A nor C will detect the collision!  Exposed node: B sends a packet to A; C hears this and decides not to send a packet to D (despite the fact that this will not cause interference)! ABC D

Multiple Access with Collision Avoidance (MACA)  Before every data transmission -Sender sends a Request to Send (RTS) frame containing the length of the transmission -Receiver respond with a Clear to Send (CTS) frame -Sender sends data -Receiver sends an ACK; now another sender can send data  When sender doesn’t get a CTS back, it assumes collision senderreceiver other node in sender’s range RTS CTS ACK data

Summary  Arbitrate between multiple hosts sharing a common communication media  Wired solution: Ethernet (use CSMA/CD protocol) -Detect collisions -Backoff exponentially on collision  Wireless solution: Use MACA protocol -Cannot detect collisions; try to avoid them