Access to Shared Media - Media Access Control protocols RD-CSY10171.

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
Chapter 7 Local Area Networks: The Basics
Institute of Technology Sligo - Dept of Computing Naming & Framing Ch. 6–Layer 2 Concepts Paul Flynn.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Module 6 Chapter 5. Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies.
The Saigon CTT Semester 1 CHAPTER 6. The Saigon CTT  Content LAN Standards. Hexadecimal Numbers. MAC Addressing. Framing. Media Access Control (MAC).
COMPUTER NETWORKS.
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
SIMS-201 LAN Basics, MANs, WANs.
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
Chapter 7 Local Area Networks: The Basics. Topics Definition of LAN Primary function, advantage and disadvantage Difference between Client/Server network.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Fundamentals CE
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
Basic LAN techniques IN common with all other computer based systems networks require both HARDWARE and SOFTWARE to function. Networks are often explained.
Component 9 – Networking and Health Information Exchange Unit 1-2 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Naming & Framing Ch. 6–Layer 2 Concepts By: Allan Johnson.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
Chapter 9 Ethernet – Part 1 CIS 82 Routing Protocols and Concepts Rick Graziani Cabrillo College Last Updated: 5/5/2008.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Logical & Physical Topologies A logical technology is how the hosts are connected logically example token Ring can be laid out in a physical star but.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Data Link Layer Dr. Muazzam A. Khan.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
CCNA1 v3 Module 1 v3 CCNA 1 Module 6 JEOPARDY K. Martin.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
Ethernet Fundamentals Overview: Part 1 (Mod 6). Note to Students and Instructors Some of the information found in the Cisco online curriculum will not.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
 LANs – A Definition - A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings,
Chapter Six The Data Link Layer. Objectives Learn about physical addressing on the network. Explore the MAC and LLC sublayers of Data Link. Get introduced.
Chapter 6 – Layer 2 MAC, Frames, Hex, etc.. Layer 1 / Layer 2 Layer 1 Signals, media, bit streams Layer 2 –Communicates with upper layers using Logical.
The Saigon CTT Semester 1 CHAPTER 6 Le Chi Trung.
Ethernet Overview it the IEEE standard for Ethernet.
Naming & Framing Ch. 6–Layer 2 Concepts. Layer 2’s Job For every limitation of Layer 1, Layer 2 has a solution. Layer 1 cannot name computers. How does.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Networking and Health Information Exchange Unit 1b ISO Open Systems Interconnection (OSI) Component 9/Unit 1b1 Health IT Workforce Curriculum Version 1.0/Fall.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 03 Standards and Technologies.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI data link layer CCNA Exploration Semester 1 Chapter 7.
SIMS-201 Computer Networks.
Multiple Access Methods
IEEE standards.
network interface card (NIC)
Ethernet and Token Ring LAN Networks
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
CCNA 1 Chapter 5 Ethernet Fundamentals
CCNA 1 v3 JEOPARDY Module 6 CCNA1 v3 Module 6 K. Martin.
SIMS-201 Computer Networks.
Chapter 12 Local Area Networks
Chapter 12 Local Area Networks
Multiple Access Methods
Ethernet and Token Ring LAN Networks
LEARNING COMPUTER NETWORKS OSI Model (layers). Why a layered model?  Easier to teach communication process.  Speeds development, changes in one layer.
Presentation transcript:

Access to Shared Media - Media Access Control protocols RD-CSY10171

2  Layer 1 involves ◦ Media  Physical, Wireless ◦ Digital data  bit streams that travel on media, ◦ Components that put signals on media, and  cables, connectors..  Have I missed anything? ◦ Topologies  Shared access  Any examples ?  Dedicated access  any example ?

 Physical layer does not have any provision to:  Issue 1: Identify ◦ Which computer does data belong to?  Issue 2: Data Format ◦ How is data ORGANISED and Carried on the media  bits/bytes, Frames  Issue 3: Access shared media Answer: Assign these jobs to the layer above it – the Data Link Layer RD-CSY10173

 Data Link layer components  Data Frames  MAC address  Media Access and protocols ◦ Ethernet ◦ Ring Topology protocol  Token Ring  FDDI RD-CSY10174

5 Application Presentation Session Transport Network Physical Data Link Computer One Application Presentation Session Transport Network Physical Data Link Computer Two Underlying Physical Medium

RD-CSY10176  The OSI –Data Link Layer is divided into two separate sub-layers: ◦ Media Access Control (MAC) – provides service to the layer below - physical layer ◦ Logical Link Control (LLC) - provides services to layer above - the network layer LLC (Logical Link Control) MAC (Media Access Control)

RD-CSY10177  Every Ethernet NIC card has a unique address – called MAC address, which provides a way for computers to identify themselves.  They give hosts a permanent, unique identification on a network. ◦ Example: F-3A-07-BC  How long is the MAC address ( in terms of bytes)?

RD-CSY10178 ◦ Example of MAC address  F-3A-07-BC ◦ 48 bits (6 bytes) in length. ◦ The first 3 bytes, are administered by the IEEE (Institution of Electrical and Electronics engineers) to help identify the manufacturer. ◦ The first three bytes are called the Organizational Unique Identifier (OUI). ◦ The remaining 3 bytes comprise the interface serial number and are unique to a card

RD-CSY10179

10  Data bits are generated by a computer that wishes to communicate  Stream of data bits or bit-stream is framed by layer 2 and transmitted on the cable (layer 1) by the Network Interface Card (NIC).  Framing provides structure to the bit-stream.  Example data frame :

RD-CSY  Two ways to access shared media  Random Access ◦ Any device on the network that has data to send can access the medium, if not used  Taking turns ◦ Each device on a network takes turns in a round-robin manner. Multi-access

 1111, 2222,… are MAC addresses  When an Data frame is sent out all devices on the network receive it.  What do they do with it? nnnn Abbreviated MAC Addresses RD-CSY1017

 When information (frame) is transmitted, each NIC on the shared media copies part of the transmitted frame to see if the destination address matches the MAC address on its NIC.  If there is a match, the rest of the frame is copied, otherwise rest of the frame is ignored nnnn Abbreviated MAC Addresses Nope Hey, that’s me! 13RD-CSY1017 Data Frame

Issue: What happens when multiple computers want try to transmit at the same time?  E.g., Computer 1 and 2 has data to send…  Two or more computers accessing media at the same time causes data Collision  Collision is detected by all computers, which then stop transmitting data  Ethernet protocol CSMA/CD summarizes these steps.. I have data to send 14RD-CSY1017 X Collision!

 Listens (Carrier Sense) to the network’s shared media to see if any other users are “on the line” by trying to sense a neutral electrical signal or carrier.  If no transmission is sensed, then multiple access allows anyone onto the media without any further permission required.  If two PCs detect a neutral signal and access the shared media at the exact same time, a collision occurs and is detected. 15RD-CSY1017

 Which topology is this ?  Taking turns MAC protocols need a permission to transfer data on network  Permission is given in the form of a control token (T), which is passed from one computer to next in a round-robin fashion ◦ Token is short, reserved frame that cannot appear in data  There is only one token, so only one computer can transmit at a time 16RD-CSY1017

 When a computer wants to transmit, it waits for the token  After it acquires the token, it can send data for the preset time.  After preset time, computer transmits token on ring  Next computer ready to transmit receives token and then transmits  If no computer is ready to transmit data, token circulates around ring 17RD-CSY1017

 IBM Token Ring ◦ Now obsolete ◦ Data transfer rate upto16Mbps  Fibre Distributed Data Interconnect (FDDI) ◦ Uses ring topology ◦ Uses fibre optics cable between stations ◦ Transmits data at 100Mbps  Uses pairs of fibres to form two concentric rings to provide fault tolerance 18RD-CSY1017

19  IEEE 802.x series standards are defined for Layer 2 (Data Link Layer) protocols for media access.  Two Popular standards for local area network are: ◦ Ethernet  IEEE Wired network  IEEE – Wireless network ◦ Token Ring  IEEE  Data Link Layer Components Logical Link Control (LLC) Ethernet Token Ring Media Access Control (MAC) Protocols

RD-CSY  Let’s pause here for a moment and bring the following together: ◦ What is the data entity at layer 2 called ? ◦ What is role of MAC address in data communication? ◦ Which protocols of media access are probabilistic/ deterministic?  CSMA/CD  Token Ring