Presentation is loading. Please wait.

Presentation is loading. Please wait.

Networks and Protocols CE00997-3 Week 2b. Topologies, CSMA/CD, CSMA/CA.

Similar presentations


Presentation on theme: "Networks and Protocols CE00997-3 Week 2b. Topologies, CSMA/CD, CSMA/CA."— Presentation transcript:

1 Networks and Protocols CE00997-3 Week 2b

2 Topologies, CSMA/CD, CSMA/CA

3 Bus Topology The original linear topology Based on 10base2 coaxial cable Limited to 185m Terminating resistor 50 ohm

4 Connectors & Cable Coaxial cable and BNC connector – Bayonet Neill-Concelman Tee connector Terminating resistor

5 Connection issues The dropper cable produces circulating currents

6 Star network All nodes are connected to a central point Original was via a hub

7 Star network A better more efficient and faster solution is via a switch

8 Star Network

9 UTP/STP

10 Ring Network (IEEE 802.5) Data flow

11 Ring Network

12 Data flows theoretically in one direction Each station can only transmit when it has the token A further enhancement is FDDI, Fibre Distributed Data Interface) – IEEE802.4 token bus based – Up to 124 miles (200 km) – Normally optical fibre but can be copper – 2 counter rotating rings

13 CSMA/CD Carrier Sense Multiple Access / Collision Detection Typically Ethernet LANs. A carrier sensing scheme is used a transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random time interval (known as "backoff delay" and determined using the truncated binary exponential backoff algorithm [see slide 14] ) before trying to send that frame again.

14 CSMA/CD Start Assemble a frame Attempt 1 Is another station transmitting? Transmit 1 st bit of frame Collision detected? Transmission finished? End Collision recovery subalgorithm Transmit next bit of the frame Yes frame successfully transmitted No Yes Recovered Not recovered Physical addresses are used (MAC) There is data from a user to send

15 Truncated binary exponential backoff After i collisions, a random number of slot times between 0 and 2 i − 1 is chosen. For the first collision, each sender might wait 0 or 1 slot times. After the second collision, the senders might wait 0, 1, 2, or 3 slot times, and so forth. As the number of retransmission attempts increases, the number of possibilities for delay increases. The 'truncated' simply means that after a certain number of increases, the exponentiation stops; i.e. the retransmission timeout reaches a ceiling, and thereafter does not increase any further. For example, if the ceiling is set at i=10, then the maximum delay is 1023 slot times. Because these delays cause other stations who are sending to collide as well, there is a possibility that, on a busy network, hundreds of people may be caught in a single collision set. Because of this possibility, after 16 attempts at transmission, the process is aborted.

16 CSMA/CA Carrier Sense Multiple Access / Collision Avoidance a station wishing to transmit has to first listen to the channel for a predetermined amount of time so as to check for any activity on the channel. If the channel is sensed "idle" then the station is permitted to transmit. If the channel is sensed as "busy" the station has to defer its transmission. This is the essence of both CSMA/CA and CSMA/CD. In CSMA/CA (LocalTalk), once the channel is clear, a station sends a signal telling all other stations not to transmit, and then sends its packet. In Ethernet 802.3, the station continues to wait for a time, and checks to see if the channel is still free. If it is free, the station transmits, and waits for an acknowledgment signal that the packet was received. Typical application is on Wireless networks

17 Hidden nodes In this example, A and B can each communicate with the hub, but are hidden from each other Typical wireless problem

18 LAN limitations The choice of connection equipment is extremely important For example do you connect via a hub or switch Last week we looked at hubs share bandwidth, so available bandwidth is: Total bandwidth Number of users

19 LAN limitations A switch however uses a process called microsegmentation to create dedication full bandwidth links between the ports

20 Proof of limitations - hub At a command prompt type (where x is the address of another machine: C:\>ping 192.168.1.x –l 65500 –n 65500 192.168.1.1 192.168.1.6.2.3.4.5 Dlink Hub

21 Ping with hub 3 PC’s, 1 cmd prompt only Note round trip time

22 Ping with hub 3 PC’s, 4 cmd prompts per PC Note increased round trip timeNetwork stalled due to too many collisions

23 Proof of limitations - switch 192.168.1.1 192.168.1.6.2.3.4.5 At a command prompt type (where x is the address of another machine: C:\>ping 192.168.1.x –l 65500 –n 65500

24 Ping with switch 3 PC’s, 4 cmd prompts per PC Noticed the reduced round trip time


Download ppt "Networks and Protocols CE00997-3 Week 2b. Topologies, CSMA/CD, CSMA/CA."

Similar presentations


Ads by Google