Networks and Protocols CE00997-3 Week 2b. Topologies, CSMA/CD, CSMA/CA.

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Ethernet – CSMA/CD Review
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Lecture 2 Computer Communications and Networks Boriana Koleva Room: C54 Phone:
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Local Area Networks.
Data and Computer Communications Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. © The McGraw-Hill Companies, Inc. Medium Access Control Asst. Prof. Chaiporn.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
Chapter 6 Multiple Radio Access
Ethernet. Ethernet (802.3) 1-persistent CSMA, CD, binary exponential backoff Carrier sense: station listens to channel first. 1-persistent: If idle, station.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Ethernet Overview it the IEEE standard for Ethernet.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
Multiple Access Methods
Chapter 12 Multiple Access.
Lab 7 – CSMA/CD (Data Link Layer Layer)
CT301 LECTURE 8.
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Chapter 12 Local Area Networks
Multiple Access Methods
Ethernet – CSMA/CD Review
Business Data Communications, 4e
Wireless LAN Simulation IEEE MAC Protocol
Chapter 12 Local Area Networks
Chapter 12 Local Area Networks
Multiple Access Methods
Presentation transcript:

Networks and Protocols CE Week 2b

Topologies, CSMA/CD, CSMA/CA

Bus Topology The original linear topology Based on 10base2 coaxial cable Limited to 185m Terminating resistor 50 ohm

Connectors & Cable Coaxial cable and BNC connector – Bayonet Neill-Concelman Tee connector Terminating resistor

Connection issues The dropper cable produces circulating currents

Star network All nodes are connected to a central point Original was via a hub

Star network A better more efficient and faster solution is via a switch

Star Network

UTP/STP

Ring Network (IEEE 802.5) Data flow

Ring Network

Data flows theoretically in one direction Each station can only transmit when it has the token A further enhancement is FDDI, Fibre Distributed Data Interface) – IEEE802.4 token bus based – Up to 124 miles (200 km) – Normally optical fibre but can be copper – 2 counter rotating rings

CSMA/CD Carrier Sense Multiple Access / Collision Detection Typically Ethernet LANs. A carrier sensing scheme is used a transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random time interval (known as "backoff delay" and determined using the truncated binary exponential backoff algorithm [see slide 14] ) before trying to send that frame again.

CSMA/CD Start Assemble a frame Attempt 1 Is another station transmitting? Transmit 1 st bit of frame Collision detected? Transmission finished? End Collision recovery subalgorithm Transmit next bit of the frame Yes frame successfully transmitted No Yes Recovered Not recovered Physical addresses are used (MAC) There is data from a user to send

Truncated binary exponential backoff After i collisions, a random number of slot times between 0 and 2 i − 1 is chosen. For the first collision, each sender might wait 0 or 1 slot times. After the second collision, the senders might wait 0, 1, 2, or 3 slot times, and so forth. As the number of retransmission attempts increases, the number of possibilities for delay increases. The 'truncated' simply means that after a certain number of increases, the exponentiation stops; i.e. the retransmission timeout reaches a ceiling, and thereafter does not increase any further. For example, if the ceiling is set at i=10, then the maximum delay is 1023 slot times. Because these delays cause other stations who are sending to collide as well, there is a possibility that, on a busy network, hundreds of people may be caught in a single collision set. Because of this possibility, after 16 attempts at transmission, the process is aborted.

CSMA/CA Carrier Sense Multiple Access / Collision Avoidance a station wishing to transmit has to first listen to the channel for a predetermined amount of time so as to check for any activity on the channel. If the channel is sensed "idle" then the station is permitted to transmit. If the channel is sensed as "busy" the station has to defer its transmission. This is the essence of both CSMA/CA and CSMA/CD. In CSMA/CA (LocalTalk), once the channel is clear, a station sends a signal telling all other stations not to transmit, and then sends its packet. In Ethernet 802.3, the station continues to wait for a time, and checks to see if the channel is still free. If it is free, the station transmits, and waits for an acknowledgment signal that the packet was received. Typical application is on Wireless networks

Hidden nodes In this example, A and B can each communicate with the hub, but are hidden from each other Typical wireless problem

LAN limitations The choice of connection equipment is extremely important For example do you connect via a hub or switch Last week we looked at hubs share bandwidth, so available bandwidth is: Total bandwidth Number of users

LAN limitations A switch however uses a process called microsegmentation to create dedication full bandwidth links between the ports

Proof of limitations - hub At a command prompt type (where x is the address of another machine: C:\>ping x –l –n Dlink Hub

Ping with hub 3 PC’s, 1 cmd prompt only Note round trip time

Ping with hub 3 PC’s, 4 cmd prompts per PC Note increased round trip timeNetwork stalled due to too many collisions

Proof of limitations - switch At a command prompt type (where x is the address of another machine: C:\>ping x –l –n 65500

Ping with switch 3 PC’s, 4 cmd prompts per PC Noticed the reduced round trip time