C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.

Slides:



Advertisements
Similar presentations
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Advertisements

Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
13.1 Chapter 13 Wired LANs: Ethernet Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
13.1 Chapter 13 Wired LANs: Ethernet Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 K. Salah Module 4.2: Media Access Control The Media Access Control (MAC) sublayer –Random Access (CSMA), IEEE –Token Passing, IEEE Ch 13-
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
The Medium Access Control Sublayer Chapter 4. Ethernet Cabling The most common kinds of Ethernet cabling.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 16 Introduction to Computer Networks.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 18 Introduction to Computer Networks.
Chapter 13 Wired LANs: Ethernet
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Infrastructure de Communications – CR 4107Chapter 41 The Medium Access Control Sublayer Chapter 4.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
A.S.Tanenbaum, Computer networks, ch4 MAC 1 The Medium Access Control Sublayer Medium Access Control: a means of controlling access to the medium to promote.
McGraw-Hill © The McGraw-Hill Companies, Inc., 2004 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
CSMA with Collision Detection CSMA/CD can be in one of three states: contention, transmission, or idle.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer طبقة ولوج الوسط الجزئية Chapter 4.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
13.1 Chapter 13 Wired LANs: Ethernet Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.
Medium Access Control Sub Layer
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
13.1 Chapter 13 Wired LANs: Ethernet Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
Ch 13. Wired LANs: Ethernet IEEE Standards Project 802 launched in 1985 – To set standards to enable intercommunication among equipment from a variety.
Chapter 13 Wired LANs: Ethernet Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
13.1 Chapter 13 Wired LANs: Ethernet Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 13 Wired LANs: Ethernet
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
1 Ethernet History –developed by Xerox PARC in mid-1970s –roots in Aloha packet-radio network –standardized by Xerox, DEC, and Intel in 1978 –similar to.
Wired LANs: Ethernet Shashank Srivastava Motilal Nehru national Institute Of Information Technology, Allahabad 4 Sep 2013.
The Medium Access Control Sublayer
The Medium Access Control (MAC) Sublayer. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in LANs.
Ch. 16 Ethernet Traditional Ethernet IEEE Medium Access Control –Carrier Sense Multiple Access with Collision Detection (CSMA/CD) –The most.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Example DLL Protocols 1. High-Level Data Link Control (HDLC).
Data Link Layer Lower Layers Local Area Network Standards
Chapter 13 Wired LANs: Ethernet
High Speed LANs – Ethernet and Token Ring
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
William Stallings Data and Computer Communications
The Medium Access Control Sublayer
The Medium Access Control Sublayer
Chapter 13 Wired LANs: Ethernet
The Medium Access Control (MAC) Sublayer
Computer Interfacing and Protocols
Dr. John P. Abraham Professor UTPA
Presentation transcript:

C H 4 T HE M EDIUM A CCESS C ONTROL S UBLAYER 1 Medium Access Control: a means of controlling access to the medium to promote orderly and efficient use.

OSI M ODEL AND P ROJECT 802 2

T HE C HANNEL A LLOCATION P ROBLEM Static Channel Allocation in LANs and MANs FDM: small and constant users, heavy load of traffic of each. TDM:same problem. Poor performance. None of the static channel allocation methods work well with bursty traffic. Dynamic Channel Allocation in LANs and MANs 3

P URE ALOHA In pure ALOHA, frames are transmitted at completely arbitrary times. 4 Multiple Access Protocols

P URE ALOHA (2) Vulnerable period for the shaded frame. 5

SLOTTED ALOHA Time in uniform slots equal to frame transmission time Need central clock (or other sync mechanism) Transmission begins at slot boundary Frames either miss or overlap totally Max utilization 36.8% 6

RELATIVE FORMULAS FOR THE ALOHA 7 Throughput or Channel Utilization Probability of collisionProbability of success Pure ALO HA Slott ed ALO HA

PURE ALOHA AND SLOTTED ALOHA Throughput versus offered traffic for ALOHA systems. 8

P ERSISTENT AND N ONPERSISTENT CSMA All stations know that a transmission has started almost immediately First listen for clear medium (carrier sense) If medium idle, transmit with a probability. If two stations start at the same instant, collision Propagation time is much less than transmission time Wait reasonable time (round trip plus ACK contention) No ACK then retransmit 9

P ERSISTENT AND N ONPERSISTENT CSMA Comparison of the channel utilization versus load for various random access protocols. 10

CSMA/CD (WITH COLLISION DETECTION) If collision detected, jam then cease transmission rather than finish transmitting their frame After jam, wait random time then start again Half-duplex system Save time and bandwidth. Basis of Ethernet LAN. 11

CSMA/CD OPERATION 12

T OKEN R ING (802.5) MAC protocol Small frame (token) circulates when idle Station waits for token Changes one bit in token to make it SOF for data frame Append rest of data frame Frame makes round trip and is absorbed by transmitting station Station then inserts new token when transmission has finished and leading edge of returning frame arrives Under light loads, some inefficiency Under heavy loads, round robin makes efficiency and fair. 13

T OKEN R ING O PERATION 14

FDDI MAC P ROTOCOL Fiber Distributed Data Interface As for except: Station seizes token by aborting token transmission Once token captured, one or more data frames transmitted New token released as soon as transmission finished 15

E THERNET Ethernet Cabling Manchester Encoding The Ethernet MAC Sublayer Protocol The Binary Exponential Backoff Algorithm Ethernet Performance Switched Ethernet Fast Ethernet Gigabit Ethernet IEEE 802.2: Logical Link Control 16

13.17 Ethernet evolution through four generations

13.18 Figure 13.8 Categories of Standard Ethernet

E THERNET C ABLING The most common kinds of Ethernet cabling. 19

13.20 Figure 13.9 Encoding in a Standard Ethernet implementation

13.21 Figure Base5 implementation

13.22 Figure Base2 implementation

13.23 Figure Base-T implementation

13.24 Figure Base-F implementation

13.25 Table 13.1 Summary of Standard Ethernet implementations

ETHERNET TOPOLOGY Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented. 26

B ASEBAND C ONFIGURATION The size limitation is usually solved by using repeaters to divide the medium into smaller segments Repeaters relay digital signals in both directions, making the segments appear like one medium As repeaters recover the digital signal, they remove any attenuation 27

13.28 Figure A network with and without a bridge

13.29 Figure Collision domains in an unbridged network and a bridged network

13.30 Figure Switched Ethernet

13.31 Figure Full-duplex switched Ethernet

FAST ETHERNET Fast Ethernet was designed to compete with LAN protocols such as FDDI or Fiber Channel. IEEE created Fast Ethernet under the name 802.3u. Fast Ethernet is backward-compatible with Standard Ethernet, but it can transmit data 10 times faster at a rate of 100 Mbps. MAC Sublayer Physical Layer Topics discussed in this section:

13.33 Figure Fast Ethernet topology

13.34 Figure Fast Ethernet implementations

13.35 Figure Encoding for Fast Ethernet implementation

13.36 Table 13.2 Summary of Fast Ethernet implementations

GIGABIT ETHERNET The need for an even higher data rate resulted in the design of the Gigabit Ethernet protocol (1000 Mbps). The IEEE committee calls the standard 802.3z. MAC Sublayer Physical Layer Ten-Gigabit Ethernet Topics discussed in this section:

13.38 In the full-duplex mode of Gigabit Ethernet, there is no collision; the maximum length of the cable is determined by the signal attenuation in the cable. Note

13.39 Figure Topologies of Gigabit Ethernet

13.40 Figure Gigabit Ethernet implementations

13.41 Figure Encoding in Gigabit Ethernet implementations

13.42 Table 13.3 Summary of Gigabit Ethernet implementations

13.43 Table 13.4 Summary of Ten-Gigabit Ethernet implementations

S WITCHED E THERNET A simple example of switched Ethernet. 44

FAST ETHERNET Fast Ethernet was designed to compete with LAN protocols such as FDDI or Fiber Channel. IEEE created Fast Ethernet under the name 802.3u. Fast Ethernet is backward-compatible with Standard Ethernet, but it can transmit data 10 times faster at a rate of 100 Mbps. 45

Fast Ethernet topology 46

Fast Ethernet implementations 47

13.48 GIGABIT ETHERNET The need for an even higher data rate resulted in the design of the Gigabit Ethernet protocol (1000 Mbps). The IEEE committee calls the standard 802.3z.

G IGABIT E THERNET (a) A two-station Ethernet. (b) A multistation Ethernet. 49

G IGABIT E THERNET (2) 50 Gigabit Ethernet - Differences zCarrier extension zAt least 4096 bit-times long (512 for 10/100) zFrame bursting extended to 200m. zNew coding

Summary of Ten-Gigabit Ethernet implementations 51

IEEE standard for LANs 52

IEEE 802.2: L OGICAL L INK C ONTROL (a) Position of LLC. (b) Protocol formats. 53

54 E THERNET MAC S UBLAYER P ROTOCOL WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998

55 PDU FORMAT WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998

M INIMUM AND MAXIMUM LENGTH 56

13.57 Example of an Ethernet address in hexadecimal notation

E THERNET P ERFORMANCE Efficiency of Ethernet at 10 Mbps with 512- bit slot times. 58

13.59 Figure 13.2 HDLC frame compared with LLC and MAC frames

LAN T RANSMISSION T ECHNOLOGIES Ethernet 10 Mbit/s Token Ring 4/16 Mbit/s Fast Ethernet 100 Mbit/s FDDI 100 Mbit/s Gigabit Ethernet 1 Gbit/s ATM 25 Mbit/s to 2.4 Gbit/s Only Ethernet versions are growing 60