1 MAC Protocols & High Speed LANs Lesson 8 NETS2150/2850.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

William Stallings Data and Computer Communications 7 th Edition Chapter 16 High Speed LANs.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Data and Computer Communications
Topic 7 Local Area Networks (LAN)
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
Data and Computer Communications Ninth Edition by William Stallings Chapter 16 – High Speed LANs Data and Computer Communications, Ninth Edition by William.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Chapter 6 High-Speed LANs1 Chapter 6 High-Speed LANs.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Link Layer Message M A B Problem: Given a message M at a node A consisting of several packets, how do you send the packets to a “neighbor” node B –Neighbor:
Chapter 15: LAN Systems Business Data Communications, 4e.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
FIT 1005 Networks & Data Communications Lecture 9 – High Speed LANs Reference: Chapter 16 Data and Computer Communications Eighth.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r LAN addresses and ARP r Ethernet Some slides are in courtesy of J.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
William Stallings Data and Computer Communications 7 th Edition Chapter 16 High Speed LANs.
CSMA Propagation time is much less than transmission time All stations know that a transmission has started almost immediately First listen for clear medium.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
Chapter 5 outline 5.1 Introduction and services
Data Communications and Networking Chapter 9 High Speed LANs and Wireless LANs References: Book Chapters 16 and 17 Data and Computer Communications, 8th.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Chapter 15 & 16 LAN (Local Area Network)
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Gigabit Ethernet.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.
C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Business Data Communications, 4e
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Ch. 16 Ethernet Traditional Ethernet IEEE Medium Access Control –Carrier Sense Multiple Access with Collision Detection (CSMA/CD) –The most.
William Stallings Data and Computer Communications 7 th Edition Chapter 16 High Speed LANs.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
Computer Communication Networks
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
William Stallings Data and Computer Communications
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Ethernet – CSMA/CD Review
Business Data Communications, 4e
7- chapter Seven Local Area Networks (LAN)
Multiple Access Control (MAC) Protocols
Presentation transcript:

1 MAC Protocols & High Speed LANs Lesson 8 NETS2150/2850

2 Lesson Outline  Random access MAC protocols  Ethernet Implementations Ethernet (10 Mbps) Fast Ethernet (100 Mbps) Gigabit Ethernet - GbE (1 Gbps) 10 Gb Ethernet – 10 GbE (10 Gbps)  Round robin MAC protocol Token Ring (10 Mbps & 100 Mbps)

3 Random Access Protocols  When node has frame to send transmit at full channel data rate R no a priori coordination among nodes  two or more transmitting nodes  collision  random access MAC protocol specifies: how to detect collisions how to recover from collisions (e.g., via delayed retransmissions)  Examples of random access MAC protocols: ALOHA slotted ALOHA CSMA, CSMA/CD

4 ALOHA  Built for packet radio net across Hawaiian islands  When station has frame, it sends immediately  Wait for round trip time (RTT) RTT is time between send of frame and receive of ACK  If receive ACK, fine. If not, retransmit If no ACK after repeated transmissions, give up  Frame may be damaged by noise or by another station transmitting at the same time (collision)  Max utilisation 18%

5 Slotted ALOHA  Time in uniform slots equal to frame transmission time All frames are same fixed size  Need central clock (or other sync mechanism)  Transmission begins at slot boundary  Frames either miss or overlap totally  Max utilisation 37%

6 Latest News!  The "First" Terabit switch/router  672 GbE or GbE ports  1.68 Tbps switch fabric  1 billion packets per second Force10 E1200 Switch/Router

7 Carrier Sense Multiple Access (CSMA)  First listen for clear medium (i.e. carrier sense)  If medium idle, transmit If two stations start at the same instant, collision  Wait reasonable time (RTT plus ACK contention)  No ACK then retransmit  CSMA utilisation >> ALOHA schemes  Three types: nonpersistent, 1-persistent and p- persistent CSMA

8 Nonpersistent CSMA 1.If medium is idle, transmit; otherwise, go to 2 2.If medium is busy, wait for random time and repeat 1  Random delays reduces probability of collisions  However, capacity is wasted because medium will remain idle following end of transmission Even if stations waiting to access

9 1-persistent CSMA  To avoid idle channel time, 1-persistent protocol used  Station wishing to transmit listens and obeys following: 1.If medium idle, transmit; otherwise, go to step 2 2.If medium busy, listen until idle; then transmit immediately (probability 1)  1-persistent stations are greedy  If two or more stations waiting, collision is guaranteed! Gets sorted out after collision

10 p-persistent CSMA  Compromise that attempts to reduce collisions Like nonpersistent  And reduce idle time Like 1-persistent 1.If medium idle, transmit with probability p, and delay one time unit with probability (1 – p) Time unit is typically maximum propagation delay 2.If medium busy, listen until idle and repeat step 1 3.If transmission is delayed one time unit, repeat step 1  What is an effective value of p?

11 Value of p?  n stations waiting to send  At end of a transmission, expected/average number of stations attempting to transmit is: np  If np > 1, higher chance of a collision  Repeated attempts to transmit almost guaranteeing more collisions as retries compete with new transmissions  Eventually, all stations trying to send Continuous collisions  zero throughput  So np < 1 for expected peaks of n  If heavy load expected, p small  However, as p made smaller, stations wait longer At low loads, this gives very long delays

12 CSMA/CD  With CSMA, collision occupies medium for duration of transmission  With CSMA/CD, stations listen whilst transmitting 1.If medium idle, transmit, otherwise, step 2 2.If busy, listen for idle, then transmit 3.If collision detected, stop frame transmission and send jam signal then cease transmission 4.After jam, backoff random time then start from step 1

13 CSMA/CD Operation

14 Which Persistence Algorithm?  IEEE uses CSMA/CD 1-persistent!  Both nonpersistent and p-persistent have performance problems  1-persistent (p = 1) seems more unstable than p- persistent Greed of the stations But wasted time due to collisions is short (if T frame >> T prop ) With random backoff, unlikely to collide on next tries To ensure backoff maintains stability, IEEE and Ethernet use binary exponential backoff

15 Ethernet uses CSMA/CD  adapter doesn’t transmit if it senses that some other adapter is transmitting, that is, carrier sense  transmitting adapter aborts when it senses that another adapter is transmitting, that is, collision detection  Before attempting a retransmission, adapter waits a random time, that is, random access

16 Ethernet CSMA/CD algorithm  If adapter detects another transmission while transmitting aborts and sends jam signal  After aborting, adapter enters exponential backoff: after the mth collision, adapter chooses a K at random from {0,1,2,…,2 m -1}  Adapter waits K*512 bit times and returns to Step 1

17 Ethernet’s CSMA/CD (more) Jam Signal: make sure all other transmitters are aware of collision; 48 bits; Bit time: 0.1  s for 10 Mbps Ethernet ; for K=1023, wait time is about 50 ms Binary Exponential Backoff:  Goal: adapt retransmission attempts to estimated current load heavy load: random wait will be longer  first collision: choose K from {0,1}; delay is K x 512 bit transmission times  after second collision: choose K from {0,1,2,3}…  after ten collisions, choose K from {0,1,2,3,4,…,1023}

18 Example Suppose stations A and B are on the same 10 Mbps Ethernet segment, and the propagation delay between them is 500 bit times. In the worst case, will A be able to detect a collision involving B? Solution Worst case: Min frame size = 512 bits Time for complete bit emission = Time for collision detection = = 999 Since 576 < 999, collision not detected by A! AB 500 bits

19 IEEE Frame Format Ethernet is similar, but length is replaced by type Both has min frame size = 512 bits (64 octets)

20 IEEE Notation for 10 Mbps Ethernet  10Base510Base210Base-T10Base-F MediumThickThinUTP850nm CoaxialCoaxialfibre SignalingBasebandBasebandBaseband Manchester ManchesterManchester On/Off TopologyBusBusStarStar Nodes

21 100Mbps Fast Ethernet  Use same IEEE MAC protocol and frame format  100BASE-TX uses STP or Cat 5 UTP  100BASE-FX uses optical fiber  100BASE-T4 can use Cat 3 UTP 100 Mbps over lower quality cables Uses 4 twisted-pair lines between nodes Data transmission uses three pairs in one direction at a time  Star-wire physical topology Similar to 10BASE-T

22 100Mbps (Fast Ethernet) 100Base-TX100Base-FX100Base-T4 2 pair, STP2 pair, Cat 5 UTP2 optical fibre4 pair, cat 3,4,5 MLT-3MLT-34B5B, NRZI8B6T,NRZ

23 100BASE-T Options

24 Full Duplex Operation  Traditional Ethernet half duplex Either transmit or receive but not both simultaneously  With full-duplex, station can transmit and receive simultaneously 100-Mbps Ethernet in full-duplex mode, theoretical transfer rate 200 Mbps  Must use switches Each station constitutes separate collision domain! In fact, no collisions

25 Gigabit Ethernet - Differences  Same frame format and MAC protocol as before  Carrier extension is used for short frames At least 4096 bit-times long (cf. 512 for 10/100)  T frame > T prop (legacy compatibility)  Frame bursting – allows multiple short frames transmission  1000BaseT is standardised as IEEE 802.3ab

26 Gigabit Ethernet – Physical  1000Base-SX Short wavelength, multimode fibre  1000Base-LX Long wavelength, Multi or single mode fibre  1000Base-CX Copper jumpers < 25m, shielded twisted pair (STP)  1000Base-T 4 pairs of Cat 5 UTP

27 Gigabit Ethernet Medium Options

28 Cisco® High-end Switches

29 Gigabit Ethernet Configuration

30 10 Gigabit Ethernet - Uses  High-speed, local backbone interconnection between large-capacity switches or server farm  Campus wide connectivity  Allows construction of MANs and WANs Connect geographically dispersed LANs between campuses  Ethernet competes with ATM and other WAN technologies  10GbE provides substantial value over ATM  10GBaseT is standardised as IEEE 802.3ae

31 10GbE - Advantages  No expensive, bandwidth-consuming conversion between Ethernet packets and ATM cells  Network is Ethernet, end to end Optimizing operation and cost for LAN, MAN, or WAN  Variety of standard optical and STP interfaces specified for 10 GbE

32 10 GbE Implementations  Maximum link distances cover 300 m to 40 km  10GBASE-S (short): 850 nm on multimode fiber Up to 300 m  10GBASE-L (long) 1310 nm on single-mode fiber Up to 10 km  10GBASE-E (extended) 1550 nm on single-mode fiber Up to 40 km

33 10GbE Distance Options

34 Cisco® 10GbE module  Supports 10GBase-S/L/E/CX  Up to GbE ports  256 MB buffer per port  Up to 400 million frames per sec (mfps)  Supports jumbo frame size (up to 9216 octets)!

35 “Taking Turns” MAC Protocols  Involve a controlled access  No collision!  A station cannot send unless been “authorised”  There are two main types: Polling Token-passing

36 The Polling Scheme  The master/central node “invites” slave nodes to transmit in turn  Main concerns: polling overhead latency single point of failure (master)

37 Token Ring  Developed from IBM's commercial token ring  Because of IBM's large presence, token ring has gained broad acceptance  But, never achieved popularity of Ethernet!  Currently, large installed base of token ring products  Market share likely to decline

38 Ring Operation  Each repeater connects to two others via unidirectional transmission links Single closed path  Data transferred bit by bit from one repeater to the next  Repeater regenerates and retransmits each bit  Frame removed by transmitter after one trip round ring

39 Ring Repeater States

40 IEEE Frame Format Data Frame Token Frame

41 IEEE MAC Protocol- Token Passing  A special frame (i.e. token) circulates continuously  Station waits for the token Changes one bit in token to make it SOF for data frame Append rest of data frame  Frame makes round trip and is absorbed by transmitting station Inserts new token when transmission has finished How long to hold token – token holding time (THT)  Under light loads, some inefficiency  Under heavy loads, round robin

42 Token Ring Operation

43 LAN Performance Comparison Fig

44 Wireless LAN Overview  A wireless LAN uses wireless medium Saves installation of LAN cabling  Eases relocation and other modifications to network structure  Popularity of wireless LANs has grown rapidly  Role for the wireless LAN Manufacturing plants, stock exchange trading floors, warehouses Historical buildings Small offices where wired LANs not economical  IEEE has specified this technology in standard

45 IEEE Wireless LAN  b GHz unlicensed radio spectrum up to 11 Mbps widely deployed, using base stations  a 5-6 GHz range up to 54 Mbps  g GHz range up to 54 Mbps  All use CSMA/CA for MAC protocol  All have infrastructure and ad-hoc network versions

46 Infrastructure Approach  Wireless host communicates with an access point  Basic Service Set (BSS) (a.k.a. “cell”) contains: wireless stations one access point (AP)  BSSs combined to form a distribution system (DS) McGraw-Hill © The McGraw-Hill Companies, Inc., 2004

47 Ad Hoc Approach  No AP!  Wireless stations communicate with each other  Typical usage: “laptop” meeting in conference room, car interconnection of “personal” devices battlefield  IETF MANET (Mobile Ad hoc Networks) working group looks into this approach Special needs such wireless routing, security

48 IEEE : MAC protocol  Collision if 2 or more nodes transmit at same time as the wireless channel is shared  CSMA makes sense: get all the bandwidth if you’re the only one transmitting shouldn’t cause a collision if you sense another transmission  Thus, it uses CSMA with collision avoidance (CSMA/CA) Not CD because detecting collision is difficult in wireless environment Two-handshaking used

49 Summary  Random access protocol CSMA/CD in (Ethernet)  Round Robin Token passing in (Token Ring)  Wireless LAN  Read Stallings chapter 16  Next: Layer-3  Network layer