Lecture #14: Local Area Networks: Aloha Ethernet Token Ring Token Bus
Lecture #14: Local Area Networks: Aloha Ethernet Token Ring Token Bus
ALOHA
Ethernet
Token Ring
Token Bus
Medium Access Control sublayer
• Technically said, the MAC sublayer is the bottom part of the DLL.
2
The Channel Allocation Problem
3
Dynamic Channel Allocation in LANs and MANs
• Assumptions:
• Station Model. The model consists of N independent stations (e.g.,
computers, telephones, or personal communicators), each with a
program or user that generates frames for transmission. Stations
are sometimes called terminals. The probability of a frame being
generated in an interval of length Dt is l*Dt, where l is a constant
(the arrival rate of new frames). Once a frame has been
generated, the station is blocked and does nothing until the frame
has been successfully transmitted.
4
Dynamic Channel Allocation in LANs and MANs
(2)
• Assumptions:
• Collision Assumption. If two frames are transmitted
simultaneously, they overlap in time and the resulting signal is
garbled. This event is called a collision. All stations can detect
collisions. A collided frame must be transmitted again later. There
are no errors other than those generated by collisions.
5
Dynamic Channel Allocation in LANs and MANs (3)
• Assumptions:
• Carrier Sense. Stations can tell if the channel is in use before trying to use it. If the
channel is sensed as busy, no station will attempt to use it until it goes idle.
• No Carrier Sense. Stations cannot sense the channel before trying to use it. They just go
ahead and transmit. Only later can they determine whether the transmission was
successful.
6
ALOHA
• ALOHA - a ground-based radio broadcasting
system. Many uncoordinated users are competing
for the use of a single shared channel.
9
Pure ALOHA (3)
• Whenever two frames try to occupy the channel at the same time, there will be a
collision and both will be garbled. Both will have to be retransmitted later.
• The checksum cannot (and should not) distinguish between a total loss and a near miss.
10
Slotted ALOHA
• The method: Divide time into discrete intervals, each interval corresponding to one
frame.
• A special station emits a pip at the start of each interval, like a clock.
• A user is not permitted to send whenever a special chcaracter (for example: CR) is
typed. Instead, it is required to wait for the beginning of the next slot.
11
ALOHA systems comparison
12
Carrier Sense Multiple Access Protocols
• With slotted ALOHA the best channel utilization that can be achieved is 1/e. Stations
transmitting at will, without paying attention to what the other stations are doing =>
many collisions.
• In LAN, however, it is possible for stations to detect what other stations are doing, and
adapt their behavior accordingly => much better utilization than 1/e.
13
Carrier Sense Multiple Access Protocols (2)
• Protocols in which stations listen for a carrier (i.e., a transmission) and act
accordingly are called carrier sense protocols.
14
CSMA types:persistent and nonpersistent
• 1-persistent: When a station has data to send, it first listens to the channel to see if
anyone else is transmitting at that moment. If the channel is busy, the station waits until
it becomes idle. When the station detects an idle channel, it transmits a frame. If a
collision occurs, the station waits a random amount of time and starts all over again.
The protocol is called 1-persistent because the station transmits with a probability of 1
when it finds the channel idle.
15
CSMA types: persistent and nonpersistent (2)
• Nonpersistent: Before sending, a station senses the channel. If no one else is sending, the
station begins doing so itself. However, if the channel is already in use, the station waits
a random period of time and then repeats the algorithm. Consequently, this algorithm
leads to better channel utilization but longer delays than 1-persistent CSMA.
16
CSMA types: persistent and nonpersistent (3)
• Rather than finish transmitting their frames, which are irretrievably garbled anyway,
the stations should abruptly stop transmitting as soon as the collision is detected.
Quickly terminating damaged frames saves time and bandwidth.
19
CSMA / CD states
21
CSMA / CD details (2)
Assumptions:
Tthere are exactly N stations, each with a unique address from 0
to N - 1 '‘hardcoded' into it.
It does not matter that some stations may be inactive part of the
time.
The propagation delay is negligible.
23
Ethernet
• IEEE has standardized a number of LANs and MANs under the name of IEEE 802. A
few have survived but many have not.
• The most important of the survivors are 802.3 (Ethernet) and 802.11 (wireless LAN)
• For 802.15 (Bluetooth) and 802.16 (wireless MAN), it is too early to tell.
• Both 802.3 and 802.11 have different physical layers and different MAC sublayers but
converge on the same logical link control sublayer (defined in 802.2), so they have the
same interface to the network layer.
24
Ethernet Cabling
26
Cable topologies
27
Ethernet frame formats
28
Ethernet frame format
•Preamble: Sequence of 10101010s. 8 bytes.
(SOF, Start of Frame delimiter, for compatibility with 802.4 and 802.5)
•Addresses: 2 or 6 bytes.
• high-order bit of the destination address:
– 0 for ordinary addresses
– 1 for group addresses.
• bit 46 - global or local address.
Type: specifies which process to give the frame to.
(Any number <=1500 is treated as length or as type otherwise.)
•Data: up to 1500 bytes.
•Pad: (optional) The frame must be at least 64 bytes in total!
•Checksum: CRC based on this polynomial:
x32+x26+x23+x22+x16+x12+x11+x10+x8+x7+x5+x4+x2+x+1
29
Token Ring – IEEE 802.5
• A ring toplogy network developed in the late 1960s. Supported mainly by IBM.
Pushed into the background by Ethernet in the 1990s.
• a LAN protocol which resides at the data link layer (DLL) of the OSI model.
30
Cabling and speed
• Speed:
– 4 Mbps (1985)
– 16 Mpbs (1989, IBM)
31
Token Ring operation
32
Token Bus – IEEE 802.4
• A network which implements the modified Token Ring protocol over a "virtual ring"
on a coaxial cable with a bus topology.
• It is mainly used for industrial applications (GM®).
1 1 1
1 1
33
Plan of talk
34
History & Development
35
Introduction
36
FDDI Features
The inside architecture of the FDDI is based on the dual rings where the data
is flowing in the opposite directions.
There are two levels of rings the primary and the secondary.
Most of the data transmission takes place using the primary ring and the
secondary is idle.
However in case the primary does not work the secondary takes over the
primary’s functionalities
It also use optical bypass switch for avoiding the wrap
38
FDDI TYPES
39
Cont…
• FDDI is used mainly in mission critical and high traffic networks where large
amounts of data flow need to flow quickly and efficiently.
41
Advantages
42
Future of FDDI
• A newer version of FDDI, called FDDI-2, supports the transmission of audio and
visual information as well as data.
• Another version, FDDI-Full Duplex Technology or FFDT, uses the same network
setup as FDDI but can support twice the data rate, or 200 Mbps.
43