1 Multiple Access: Ethernet Section 2.6. 2 Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
5: DataLink Layer5-1 Mac Addressing, Ethernet, and Interconnections.
1 Links Reading: Chapter 2 COS 461: Computer Networks Spring 2006 (MW 1:30-2:50 in Friend 109) Jennifer Rexford Teaching Assistant: Mike Wawrzoniak
Computer Networks Ethernet I Professor Hui Zhang
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
1 Ethernet EECS 489 Computer Networks Z. Morley Mao Wednesday Feb 21, 2007 Acknowledgement: Some slides taken.
5/31/05CS118/Spring051 twisted pair hub 10BaseT, 100BaseT, hub r T= Twisted pair (copper wire) r Nodes connected to a hub, 100m max distance r Hub: physical.
5: DataLink Layer5a-1 MAC Sublayer. 5: DataLink Layer5a-2 Multiple Access Links and Protocols Two types of “links”: r point-to-point m PPP for dial-up.
5: DataLink Layer5-1 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram to destination IP subnet r MAC (or LAN or.
5: DataLink Layer5-1 Data Link Layer r What is Data Link Layer? r Multiple access protocols r Ethernet.
5-1 Data Link Layer r What is Data Link Layer? r Multiple access protocols r Link-layer Addressing r Ethernet.
1 Announcement r Homework #3 was due last night r Homework #4 is out.
EE 122: Ethernet and Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
5: DataLink Layer – Ethernet, Hubs and Switches.
1 Interconnection ECS 152A. 2 Interconnecting with hubs r Backbone hub interconnects LAN segments r Extends max distance between nodes r But individual.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r LAN addresses and ARP r Ethernet Some slides are in courtesy of J.
Introduction 1 Lecture 25 Link Layer (Ethernet, Switch) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
1 ECE453 – Introduction to Computer Networks Lecture 8 – Multiple Access Control (II)
DataLink Layer1 Ethernet Technologies: 10Base2 10: 10Mbps; 2: 200 meters (actual is 185m) max distance between any two nodes without repeaters thin coaxial.
Link Layer Zeinab Movahedi Some slides are from Computer networks course thought by Jennifer Rexford at Princeton University.
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
1 Random Access Protocols r When node has packet to send m transmit at full channel data rate R. m no a priori coordination among nodes  two or more transmitting.
Chapter 13 Wired LANs: Ethernet
Links Mike Freedman COS 461: Computer Networks Lectures: MW 10-10:50am in CS 104
Lecture 17 Ethernet r Widely deployed because: m First LAN technology m Simpler and less expensive than token LANs and ATM m Kept up with the speed race:
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
4-1 Last time □ Link layer overview ♦ Services ♦ Adapters □ Error detection and correction ♦ Parity check ♦ Internet checksum ♦ CRC □ PPP ♦ Byte stuffing.
Link Layer: MAC Ilam University Dr. Mozafar Bag-Mohammadi.
Multiple Access Readings: Kurose & Ross, 5.3, 5.5.
Data Link Layer Moving Frames. Link Layer Protocols: ethernet, wireless, Token Ring and PPP Has node-to-node job of moving network layer.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
5: DataLink Layer5-1 CSMA (Carrier Sense Multiple Access) CSMA: listen before transmit: If channel sensed idle: transmit entire frame r If channel sensed.
CS 1652 Jack Lange University of Pittsburgh 1. 5: DataLink Layer5-2 MAC Addresses and ARP r 32-bit IP address: m network-layer address m used to get datagram.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
5: DataLink Layer5-1 Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer Addressing.
Ch 5. The Link Layer and Local Area Networks Myungchul Kim
Link Layer MAC Dr. Mozafar Bag-Mohammadi University of Ilam.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
1 Ethernet “dominant” LAN technology: cheap $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
Links Mike Freedman COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
5-1 Last time □ Multiple access protocols ♦ Channel partitioning MAC protocols TDMA, FDMA ♦ Random access MAC protocols Slotted Aloha, Pure Aloha, CSMA,
Link Layer 5.1 Introduction and services
Hubs Hubs are essentially physical-layer repeaters:
University of Pittsburgh
CS 457 – Lecture 6 Ethernet Spring 2012.
Data Link Issues Relates to Lab 2.
Mac Addressing, Ethernet, and Interconnections
Hubs Hubs are essentially physical-layer repeaters:
Data Link Issues Relates to Lab 2.
Links Jennifer Rexford COS 461: Computer Networks
Protocol layering and data
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Dr. Mozafar Bag-Mohammadi University of Ilam
18: Ethernet, Hubs, Bridges, Switches
Protocol layering and data
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Link Layer 5.1 Introduction and services
Presentation transcript:

1 Multiple Access: Ethernet Section 2.6

2 Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet switch and host Broadcast (shared wire or medium) –Traditional Ethernet – wireless LAN mmmmmmmmmm mmmmmmmmmm mmmmmmmmmm mmmmmmmmmm mmmmmmmmmm mmmmmmmmmm mmmmmmmmmm m

3 Multiple Access Protocol Single shared broadcast channel –Avoid having multiple nodes speaking at once –Otherwise, collisions lead to garbled data Multiple access protocol –Distributed algorithm for sharing the channel –Algorithm determines which node can transmit Classes of techniques –Channel partitioning: divide channel into pieces –Taking turns: passing a token for the right to transmit –Random access: allow collisions, and then recover

4 Random Access Protocols When node has packet to send –Transmit at full channel data rate R. –No a priori coordination among nodes Two or more transmitting nodes ➜ “collision” Random access MAC protocol specifies: –How to detect collisions –How to recover from collisions Examples –CSMA/CD (Ethernet: IEEE 802.3) –CSMA/CA (Wireless: IEEE )

5 Key Ideas of Random Access Carrier sense –Listen before speaking, and don’t interrupt Checking if someone else is already sending data … and waiting till the other node is done Collision detection –If someone else starts talking at the same time, stop Realizing when two nodes are transmitting at once …by detecting that the data on the wire is garbled Randomness –Don’t start talking again right away Waiting for a random time before trying again

6 CSMA/CD (Collision Detection) Carrier Sense Multiple Access, CSMA: listen before transmit –If channel sensed idle: transmit entire frame –If channel sensed busy, defer transmission CD, Collision Detection : –Collisions detected within short time –Colliding transmissions aborted, reducing wastage –Easy in wired LANs: measure signal strengths, compare transmitted, received signals –Difficult in wireless LANs: receiver shut off while transmitting Human analogy: the polite conversationalist

7 CSMA/CD Collision Detection

8 Ethernet Dominant wired LAN technology First widely used LAN technology Simpler, cheaper than token LANs and ATM Kept up with speed race: 10 Mbps – 10 Gbps Metcalfe’s Ethernet sketch

9 Ethernet Topologies Bus Topology: Shared All nodes connected to a wire Star Topology: All nodes connected to a central repeater

10 Ethernet Connectivity 10Base5 – ThickNet < 500m Controller Vampire Tap Transceiver Bus Topology Detects when the line is idle Drives the signal when the host is transmitting Receives incoming signals Controller: Implements all the logic that makes up the Ethernet

11 Ethernet Connectivity 10Base2 – ThinNet < 200m Controller BNC T-Junction Transceiver Bus Topology

12 Ethernet Connectivity 10BaseT < 100m twisted pair hub Controller Star Topology

13 Ethernet MAC Protocol, CSMA/CD Carrier sense: wait for link to be idle –Channel idle: start transmitting must wait 9.6 µ s between back-to-back frames –Channel busy: wait until idle and transmit immediately Collision detection: listen while transmitting –No collision: transmission is complete –Collision: abort transmission, and send a 32-bit “jamming sequence”

14 Ethernet MAC Protocol, CSMA/CD(cont.) Random access: exponential back-off –After collision, wait a random time before trying again –After m th collision, choose K randomly from {0,..., 2 m -1} –… and wait for K*512 bits transmission time before trying again K*51.2 µ s on 10Mbps Ethernet

15 Delay Times After Collision Delay and try again –1st time: 0 or 51.2 µ s –2nd time: 0, 51.2, or µ s –3rd time: 0, 51.2, 102.4, or µ s –After n collisions, wait time: k x 51.2 µ s, for randomly selected k=0 … 2 n - 1 –give up after several tries (up to 16) –exponential backoff

16 Collisions AB How can we ensure that A knows about the collision?

17 Limitations on Ethernet Length Latency depends on physical length of link –Time to propagate a packet from one end to the other Suppose A sends a packet at time t –And B sees an idle line at a time just before t+d –… so B happily starts transmitting a packet B detects a collision, and sends jamming signal –But A doesn’t see collision till t+2d latency d A B

18 Limitations on Ethernet Length A needs to wait for time 2d to detect collision –So, A should keep transmitting during this period –… and keep an eye out for a possible collision Imposes restrictions on Ethernet –Maximum length of the wire: 2500 meters –Minimum length of the packet: 512 bits (64 bytes) –2d is bounded to 51.2  s –At 10Mbps, and during 51.2  s, 512bit are transmitted (64B) –Packet length  64B latency d A B

19 Ethernet Frame Structure Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame Preamble: 8 bytes 7 bytes with pattern followed by one byte with pattern Used to synchronize receiver, sender clock rates (Manchester encoding)

20 Ethernet Frame Structure (con. I) Address: 6 bytes –unique, 48-bit unicast address assigned to each adapter (2 48 > 281 Billion); human readable, burned in ROM (example: 8:0:2b:e4:b1:2 ( ) –broadcast: all 1s –multicast: first bit is 1 used to send messages to some subset of the hosts on an Ethernet (e.g. all file servers) adaptor programmed to accept some set of multicast addresses

21 Ethernet Frame Structure (con. II) Adaptor receives all frames and accepts: –Frames addressed to its address; –Frames addressed to the broadcast address; –Frames addressed to a multicast address, if it has been instructed to listen to that address; –All frames, if it has been placed in promiscuous mode. Type: 2B; indicates the higher layer protocol (mostly IP but others may be supported such as Novell IPX and AppleTalk) CRC: 4B; checked at receiver, if error then frame is discarded

22 Ethernet Frame Structure (con. III) Frame Data: Up to 1500 data bytes – Minimally 46 bytes of data –Minimal frame = 46 (data) + 14 (header) + 4 (CRC) = 64 bytes The reason for a minimum frame size is that the frame must be long enough to detect a collision 14-byte header

23 Unreliable, Connectionless Service Connectionless –No handshaking between sending and receiving adapter. Unreliable –Receiving adapter doesn’t send ACKs –Packets passed to network layer can have gaps –Gaps will be filled if application is using TCP –Otherwise, the application will see the gaps

24 Hubs: Physical-Layer Repeaters Hubs are physical-layer repeaters –Bits coming from one link go out all other links –At the same rate, with no frame buffering –No CSMA/CD at hub: adapters detect collisions twisted pair hub

25 Interconnecting with Hubs Backbone hub interconnects LAN segments All packets seen everywhere, forming one large collision domain Can’t interconnect Ethernets of different speeds hub

26 Switch Link layer device –Stores and forwards Ethernet frames –Examines frame header and selectively forwards frame based on MAC destination address –When frame is to be forwarded on segment, uses CSMA/CD to access segment Transparent –Hosts are unaware of presence of switches Plug-and-play, self-learning –Switches do not need to be configured

27 Switch: Traffic Isolation Switch breaks subnet into LAN segments Switch filters packets –Same-LAN-segment frames not usually forwarded onto other LAN segments –Segments become separate collision domains hub switch collision domain

28 Benefits of Ethernet Easy to administer and maintain Inexpensive Increasingly higher speed Moved from shared media to switches –Change everything except the frame format –A good general lesson for evolving the Internet

29 Conclusions IP runs on a variety of link layer technologies –Point-to-point links vs. shared media –Wide varieties within each class Link layer performs key services –Encoding, framing, and error detection –Optionally error correction and flow control Shared media introduce interesting challenges –Decentralized control over resource sharing –Partitioned channel, taking turns, and random access –Ethernet as a wildly popular example Next time: Token Ring –Reading: Section 2.7