COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M “Local Area Networks” Topics: LAN Standards:

Slides:



Advertisements
Similar presentations
Topic 7 Local Area Networks (LAN)
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
1 A Station A begins transmission at t=0 A Station A captures channel at t=t prop CSMA Random Access Scheme.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
Ethernet Standards Ethernet concepts origin DIX consortium – Mbps Ethernet 1 st Blue book – 1980 IEEE group takes over – Project 802 –802.1 – High.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EECC694 - Shaaban #1 lec #6 Spring Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: –Computers connected by communication.
Chapter 13 Wired LANs: Ethernet
Ethernet. Ethernet [DEC, Intel, Xerox] 1-persistent, CSMA-CD with Binary Exponential Backoff Manchester encoding.
LECTURE 13 NET BASE FP STANDARDS Pair of Fiber Optics. Star topology. 1 km for each part of network. Analog signal. Encoding the digital signal.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Ethernet, ARP.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
Thin Ethernet (10B2 / IEEE 802.3a) Segment length 0.5 m Up to 30 attached nodes Cable flexible and cheap Integrated or external transceiver connected via.
Enhanced CSMA Additional improvement  Use CSMA access  Listen while transmitting  Stop immediately if collision sensed  Called collision detection.
Review: Medium Access Control Sublayer –What is the problem to be addressed in this sublayer? –Protocols that allow collision Pure ALOHA Slotted ALOHA.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
Ethernet Two nodes transmit at the same time
Chapter 13 Wired LANs: Ethernet
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
Packet Transmission (Part III) Local Area Networks (LANs)
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
Local Area Networks: Ethernet. IEEE Background Institution of Electrical and Electronic Engineering (IEEE) A professional non-profit organization Project.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
LANs : Aloha/CSMA , summary
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
Department of Computer Science, University of Peshawar Multiple Access.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
IEEE STANDARDS IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication.
Chapter 14 Local Area Networks
Rehab AlFallaj.  Standards determine:  Techniques used in the networks.  Its protocols.  Network specifications and features.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Wired LANs: Ethernet Shashank Srivastava Motilal Nehru national Institute Of Information Technology, Allahabad 4 Sep 2013.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
LECTURE 11 NET301 11/16/2015Lect IEEE LAN STANDARDS Ethernet LAN (by Xerox): Topology: Bus Transmission Media: Thick Coaxial Cable. Signal: Digital.
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif
CT1303 LAN Rehab AlFallaj.
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Protocol layering and data
7- chapter Seven Local Area Networks (LAN)
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Chaithra Ashwin Sanjana
Computer Interfacing and Protocols
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Ethernet and Token Ring LAN Networks
Presentation transcript:

COSC 3213: Computer Networks I Instructor: Dr. Amir Asif Department of Computer Science York University Section M “Local Area Networks” Topics: LAN Standards: IEEE 802.3, IEEE 802.3u, IEEE 802.3z, IEEE Garcia: Sections 6.7 – 6.8

2 Review of Number System Consider four representations for integers: 1. Decimal, each digit lies between 0 and 9 2. Binary, each bit is either 0 or 1 3. Octal, ecah octal digit lies between 0 and 7 4. Hexadecimal, each hexadecimal digit lies between 0 and F Activity 1: Convert the decimal number 1500 into representations (2) – (4).

3 IEEE History 1.Developed in the 1970s by Xerox 2.Dec, Intel, and Xerox completed the “DIX” standard for 10Mbps LAN based on coaxial cable. “DIX” standard is referred to as “DIX Ethernet Standard” or simply “Ethernet”. 3.IEEE LAN standard was developed in 1985, very similar to DIX. 4.In 1995, the 100Mbps Fast Ethernet standard (IEEE 802.3u) was approved. 5.In 1998, the 1Gbps Gigabit Ethernet Standard (IEEE 802.3z) was approved. 6.Trend of faster and long range Ethernet continues …

4 IEEE – Protocol (1) 1.IEEE uses the 1-persistent CSMA/CD protocol in the MAC sublayer  A station with a frame to transmit waits until the channel is free (or silent).  When the channel goes silent, the frame is transmitted.  If a collision is not detected for (2 × propagation time), frame is assumed delivered  In case of a collision, the station aborts the transmission and reattempts after a randomly scheduled time 2.Rescheduling Algorithm: is based on a truncated exponential backoff algorithm.  For n’th transmission, the backoff period is selected by choosing a length at random between (0, 2 k – 1) minislots where k = min(n,10).  Minislot: defined as a duration that is at least as long as (2 × propagation delay)  1 st Retransmission:(0,1) minislots 2 nd Retransmission:(0,1,2,3) minislots 3 rd Retransmission:(0,1,2,3,4,5,6,7) minislots 10 th and higher retransmissions:(0,1,2, …, 2 10 – 1) minislots

5 IEEE – Protocol (2) 3.A total of 16 retransmission attempts are allowed. Activity 2: Show that the total propagation delay for a 10Mbps LAN consisting of five segments, each 2500m long and connected to each other with 4 repeaters, is around 51.2 ms. What is the minimum length of an Ethernet frame designed for the 10Mbps LAN? (Assume a propagation speed of 2.5 × 10 8 m/s)Answer: 512 bits 4.Activity on the IEEE LAN is sum of four components:  Idle: nearly 0 near saturation.  Contention: multiple of (2t prop )  Transmission: L / R  Propagation: t prop 5.The average number of minislots per contention period is e minislots. 6.The normalized throughput of IEEE is given by: contentiontransmissionidle 2t prop

6 IEEE – Protocol (3) 7.Effect of a on performance of IEEE 802.3: 8.Transfer delays (multiples of slots) grow very large as load approaches throughput aNormalized throughput CSMA-CD Load Avg. Transfer Delay a = 0.01a = 0.1 a = 0.2

7 IEEE – Frame Structure (1) PreambleSD Destination Address Source Address LengthInformationPadFCS 712 or 6 24 (bytes) MAC Frame Preamble: has 7 bytes of the bit pattern ……. Used for synchronization Starting Delimiter (SD): , indicates start of the frame Source/Destination Address:6 octets (or 48 bits long) is always used => 2 46 global addresses Length:specifies the length of data (information) in bytes (or octets) Max. frame length = 1518 bytes excluding preamble & SD Information = 1518 – 18 = 1500 bytes Length field = (05DC) 16 < (0600) 16 Min. frame length = 512 bits or 64 bytes Pad field ensures that the frame is at least 64 bytes long Length field = ?

8 IEEE – Frame Structure (2) PreambleSD Destination Address Source Address LengthInformationPadFCS 712 or 6 24 (bytes) MAC Frame Source/Destination Address:6 octets (or 48 bytes) are always used Types of Addresses: 0 Single address 147 bits Unicast addressing based on NIC card 1 Group address Multicast addressing to identify groups 111 … 1 = broadcast to all stations 147 bits 0 Local address 146 bits Machine addressed is on the local network 1 Global address 146 bits Machine addressed is outside the local network

9 IEEE – Frame Structure (3) PreambleSD Destination Address Source Address LengthInformationPadFCS 712 or 6 24 (bytes) MAC Frame Source/Destination Address:6 octets (or 48 bytes) are always used Types of Addresses: FCS:Frame Check Sum Based on CCITT 32-bit CRC code Structure of DIX Ethernet Frame is same as IEEE frame except for the length bytes. In DIX Ethernet Frame, length field is replaced by type field Value of type field > (0600) bits First 24 bits are specified by the vendor CISCO = (00000C) 16 ; 3Comm = (02608C) 16 Address Vendor 124 bits

10 IEEE – Physical Layer (1)  Physical layers defined by the IEEE Standard 10Base510Base210BaseT10BaseF MediumThick CoaxialThin CoaxialTwisted PairOptical Fiber Segment length (max) 500m185m100m2km TopologyBus StarPoint to Point Data Rate10Mbps Miscellaneous Transceiver needed to attach NIC card to coax T-shaped BNC junctions used Twisted pair connects NIC card to hub responsible for comm.

11 IEEE – Physical Layer (2)  10Base5  10Base2 transceiver

12 IEEE – Physical Layer (3) High-Speed Backplane or Interconnection fabric Single collision domain  10 Base T Read more about Fast and Gigabit Ethernet ….

13 IEEE History Set of protocols at the physical and data link layer (MAC sublayer) Developed by IBM in 1980s IEEE standard modeled after IBM Token Ring in 1990s IBM and IEEE specifications differ in minor ways:  IBM’s Token Ring specifies a star; IEEE does not specify a topology but most IEEE implementations are based on a star  IBM’s Token Ring uses twisted-pair wire; IEEE does not specify a media type Speed: 4 Mbps and 16 Mbps Signalling: Differential Manchester Size: max 250 stations

14 IEEE 802.5: Token Ring Token Passing Systems: decenteralized approach with no central controller  In ring topology, each station is connected in a ring using an interface  Interface operates in two modes listen mode delay transmit mode delay to device from device input from ring output to ring

15 MAC Scheduling Approaches: Token Ring (2)  Interface operates in two modes listen mode delay transmit mode delay to device from device input from ring output to ring 1. Each bit is reproduced on the ring with a delay 2. Delay is a multiple of (one bit duration) 3. Delay allows to check for certain bit patterns 1. Station transmits a message bit by bit on ring 2. Station receives a message bit by bit from ring 3. No forwarding of bits is done

16 MAC Scheduling Approaches: Token Ring (3)  When no station is transmitting, there is a free token floating on the ring  When a free token is received (T = 0), the interface changes the passing token bit (T = 1) and starts transmitting SDAC ED Token Frame Format Starting delimiter J, K non-data symbols (line code) 00 J K 0 P P PTMR R RAccess control PPP Priority; T Token bit M Monitor bit; RRR Reservation Ending delimiter I intermediate-frame bit E error-detection bit IEJ K 1

17 MAC Scheduling Approaches: Token Ring (4)  When a free token is received (T = 0), the interface changes the passing token bit (T = 1) and starts transmitting  Each transmitted bit is removed by the destination station or by the source station  After the transmission is complete, the source station inserts the free token back onto the ring with (T = 0) SD Destination Address Source Address Information FCS 14 ED FC 2 or AC 1 FS 1 Data Frame Format SDAC ED Token Frame Format P P PTMR R RAccess control PPP Priority; T Token bit M Monitor bit; RRR Reservation

18 MAC Scheduling Approaches: Token Ring (5) Ring Latency: Maximum number of bits in transition around the ring  If frame size > ring latency, a complete frame cannot be present on the ring at one time  If frame size < ring latency, complete frame is on transition in the ring. Ring Latency (  ’  in seconds =  + Mb/R Ring Latency in bits = (  + Mb/R)R where  is total propagation delay around the ring, M is the number of stations in the ring, b is the number of bit-delays in an interface. Approaches to Token Reinsertion: 1.Single token operation (delayed token release): in which the token is released only after a complete frame is received by the transmitting station. Suitable when frame size is nearly equal to ring latency. 2.Multiple token operation (early token release): in which token is released after the transmission of a frame is completed by the transmitting station. Suitable when frame size is less than ring latency.

19 MAC Scheduling Approaches: Token Ring vs Token Bus 1.Cost : Ethernet is generally less expensive and easier to install than Token Ring. 2.Stability : Token Ring is generally more secure and more stable than Ethernet. 3.Scalability : It is usually more difficult to add more computers on a Token Ring LAN than it is to an Ethernet LAN. However, as additional computers are added, performance degradation will be less pronounced on the Token Ring LAN than it will be on the Ethernet LAN. 4.QoS : Ethernet uses CSMA/CD media access control and Token Ring uses token passing. This makes Ethernet better suited in a situation where there are a large number of computers sending fewer, larger data frames. Token Ring is better suited for small to medium size LANs sending many, smaller data frames.