CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.

Slides:



Advertisements
Similar presentations
The Medium Access Control Sublayer
Advertisements

Medium Access Control Sublayer Chapter 4 CN5E by Tanenbaum & Wetherall, © Pearson Education-Prentice Hall and D. Wetherall, 2011 Channel Allocation Problem.
Medium Access Control Sublayer. Static Channel Allocation FDM TDM Wastage of resources when some of the users are idle. What if the number of users increase.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
CSC 450/550 Part 3: The Medium Access Control Sublayer More Contents on the Engineering Side of Ethernet.
Wireless Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Data Link Layer Switching
CSC 450/550 Part 3: The Medium Access Control Sublayer.
The Protocol Stack Part of the protocol stack.
Midterm Review 1 Introduction –Basic terminology and concepts. Physical Layer –Time and frequency domains. –Bandwidth and data rate. –Analog and digital.
The Medium Access Control Sublayer Chapter 4. Ethernet Cabling The most common kinds of Ethernet cabling.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
16 February 2003 TU/e Computer Science, System Architecture and Networking 1 Communication media Thanks to A. Tanenbaum.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Chapter 2 Review of Computer Network Technology
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Thin Ethernet (10B2 / IEEE 802.3a) Segment length 0.5 m Up to 30 attached nodes Cable flexible and cheap Integrated or external transceiver connected via.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Computer Networks 1 (Mạng Máy Tính 1)
جلسه دوازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
Medium Access Control.
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
Medium Access Control. Channel Allocation Static channel allocation in LANs and MANs FDMA, TDMA, CDMA Dynamic channel allocation in LANs and MANs MAC.
CMPE 150 – Winter 2009 Lecture 9 February 3, 2009 P.E. Mantey.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer طبقة ولوج الوسط الجزئية Chapter 4.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.
10/18/2007 EETS Bluetooth Bluetooth Architecture Bluetooth Applications The Bluetooth Protocol Stack The Bluetooth Radio Layer The Bluetooth Baseband.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
CEN 4500 Data Communications Instructor: S. Masoud Sadjadi sadjadi At cs Dot fiu Dot edu Chapter 4: The Medium.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
Link Layer MAC Dr. Mozafar Bag-Mohammadi University of Ilam.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
The Medium Access Control Sublayer Chapter 4 M/M/1 System λ: mean arrival rate (frames/sec) 1/μ: mean frame length (bits/frame) C: data transmission.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet History –developed by Xerox PARC in mid-1970s –roots in Aloha packet-radio network –standardized by Xerox, DEC, and Intel in 1978 –similar to.
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs.
Distributed Systems 6. Medium Access Control Sublayer Simon Razniewski Faculty of Computer Science Free University of Bozen-Bolzano A.Y. 2014/2015.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
Medium Access Control Sublayer. What is MAC Layer In the IEEE 802 reference model of computer networking, the medium access control or media access control.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
The Data Link Layer Chapter
The Medium Access Control Sublayer
Underlying Technology
The Medium Access Control Sublayer
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer
Presentation transcript:

CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.

Collision-Free Protocols The basic bit-map protocol.

Collision-Free Protocols (2) The binary countdown protocol. A dash indicates silence.

Wireless LAN Protocols A wireless LAN. (a) A transmitting. (b) B transmitting.

Wireless LAN Protocols (2) The MACA protocol. (a) A sending an RTS to B. (b) B responding with a CTS to A.

Ethernet Ethernet Cabling The Ethernet MAC Sublayer Protocol The Binary Exponential Backoff Algorithm Ethernet Performance Switched Ethernet Fast Ethernet Gigabit Ethernet IEEE 802.2: Logical Link Control Retrospective on Ethernet

Ethernet Cabling The most common kinds of Ethernet cabling.

Ethernet Cabling (2) Three kinds of Ethernet cabling. (a) 10Base5, (b) 10Base2, (c) 10Base-T.

Ethernet MAC Sublayer Protocol Frame formats. (a) DIX Ethernet, (b) IEEE

Ethernet MAC Sublayer Protocol (2)

If a collision occurs Binary exponential backoff algorithm –Wait 0 or 1 contention interval (512bits) (random choice) –Collide again, wait 0, 1, 2, or 3 intervals –… –… wait 0, 1, 2, … 1023 intervals Goal – efficiency both when little contention and a lot

Ethernet Performance Efficiency of Ethernet at 10 Mbps with 512-bit slot times.

Switched Ethernet A simple example of switched Ethernet.

Fast Ethernet The original fast Ethernet cabling.

Gigabit Ethernet (a) A two-station Ethernet. (b) A multistation Ethernet.

Gigabit Ethernet (2) Gigabit Ethernet cabling.

Wireless LANs The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services

The Protocol Stack Part of the protocol stack.

The MAC Sublayer Protocol (a) The hidden station problem. (b) The exposed station problem.

The MAC Sublayer Protocol (2) The use of virtual channel sensing using CSMA/CA.

Data Link Layer Switching Bridges from 802.x to 802.y Local Internetworking Spanning Tree Bridges Remote Bridges Repeaters, Hubs, Bridges, Switches, Routers, Gateways Virtual LANs

Data Link Layer Switching Multiple LANs connected by a backbone to handle a total load higher than the capacity of a single LAN.

Bridges from 802.x to 802.y Operation of a LAN bridge from to

Bridges from 802.x to 802.y (2) The IEEE 802 frame formats. The drawing is not to scale.

Local Internetworking A configuration with four LANs and two bridges.

Spanning Tree Bridges Two parallel transparent bridges.

Spanning Tree Bridges (2) (a) Interconnected LANs. (b) A spanning tree covering the LANs. The dotted lines are not part of the spanning tree.

Remote Bridges Remote bridges can be used to interconnect distant LANs.

Repeaters, Hubs, Bridges, Switches, Routers and Gateways (a) Which device is in which layer. (b) Frames, packets, and headers.

Repeaters, Hubs, Bridges, Switches, Routers and Gateways (2) (a) A hub. (b) A bridge. (c) a switch.

Virtual LANs A building with centralized wiring using hubs and a switch.

Virtual LANs (2) (a) Four physical LANs organized into two VLANs, gray and white, by two bridges. (b) The same 15 machines organized into two VLANs by switches.

The IEEE 802.1Q Standard Transition from legacy Ethernet to VLAN-aware Ethernet. The shaded symbols are VLAN aware. The empty ones are not.

The IEEE 802.1Q Standard (2) The (legacy) and 802.1Q Ethernet frame formats.

Summary Channel allocation methods and systems for a common channel.