Вы находитесь на странице: 1из 59

Chapter 4

Local Area Networks


Project 802 Ethernet Token Ring FDDI

OSI Model and Project 802

Project 802

802.1 Internetworking

802.2 - Logical Link Control * 802.3 - Ethernet or CSMA/CD, Carrier-Sense Multiple Access with Collision detection LAN * 802.4 - Token-Bus LAN * 802.5 - Token Ring LAN * 802.6 - Metropolitan Area Network (MAN) 802.7 - Broadband Technical Advisory Group 802.8 - Fiber-Optic Technical Advisory Group 802.9 - Integrated Voice/Data Networks 802.10 - Network Security 802.11 - Wireless Networks* 802.12 - Demand Priority Access LAN, 100 Base VGAnyLAN

PDU Format

PDU Control Field

Technology Options
Ethernet Fast Ethernet Gigabit Ethernet 10 Gig Ethernet WLAN

LAN Technologies

MAC Frame

LAN Technologies

Ethernet Frame Structure


Preamble: 7 bytes with pattern 10101010 followed by one byte with pattern 10101011 Used to synchronize receiver, sender clock rates Addresses: 6 bytes, frame is received by all adapters on a LAN and dropped if address does not match Length: 2 bytes, length of Data field CRC: 4 bytes generated using CR-32, checked at receiver, if error is detected, the frame is simply dropped Data Payload: Maximum 1500 bytes, minimum 46 bytes If data is less than 46 bytes, pad with zeros to 46 bytes

Length

LAN Technologies

Ethernet Address

End nodes are identified by their Ethernet Addresses (MAC Address or Hardware Address) which is a unique 6 Byte address. MAC Address is represented in Decimal format e.g 00:05:5D:FE:10:0A Hexa

The first 3 bytes identify a vendor (also called prefix) and the last 3 bytes are unique for every host or device

LAN Technologies

Ethernet
10 Base 5 (Thicknet) (Bus Topology) 10 Base 2 (Thinnet) (Bus Topology) 10 Base T (UTP) (Star/Tree Topology) 10 Base FL (Fiber) (Star/Tree Topology)

LAN Technologies

Ethernet
Physical Media :10 Base5 10 Base2 10 BaseT 10 BaseFL Thick Co-axial Cable with Bus Topology Thin Co-axial Cable with Bus Topology UTP Cat 3/5 with Tree Topology Multimode/Singlemode Fiber with Tree Topology

Maximum Segment Length


10 Base5 10 Base2 10 BaseT - 500 m with at most 4 repeaters (Use Bridge to extend the network) - 185 m with at most 4 repeaters (Use Bridge to extend the network) - 100 m with at most 4 hubs (Use Switch to extend the network)

LAN Tehnologies

Ethernet BUS Topology

Repeater

LAN Technologies

Ethernet STAR Topology

Hub

Ethernet Segments

10BASE5

Transceiver

10BASE2

10BASET

1BASE5

LAN Technologies

Fast Ethernet 100 Mbps bandwidth


Uses same CSMA/CD media access protocol and packet format as in Ethernet. 100BaseTX (UTP) and 100BaseFX (Fiber) standards Physical media :100 BaseTX 100 BaseFX - UTP Cat 5e - Multimode / Singlemode Fiber

Full Duplex/Half Duplex operations.

LAN Technologies

Fast Ethernet
Provision for Auto-Negotiation of media speed: 10 Mbps or 100Mbps (popularly available for copper media only). Maximum Segment Length
100 Base TX 100 Base FX 100 Base FX 100 m 2 Km (Multimode Fiber) 20 km (Singlemode Fiber)

Gigabit Ethernet
1 Gbps bandwidth. Uses same CSMA/CD media access protocol as in Ethernet and is backward compatible (10/100/100 modules are available). 1000BaseT (UTP), 1000BaseSX (Multimode Fiber) and 1000BaseLX (Multimode/Singlemode Fiber) standards. Maximum Segment Length
1000 Base T 1000 Base SX 1000 Base LX 1000 Base LX 1000 Base LH 100m (Cat 5e/6) 275 m (Multimode Fiber) 512 m (Multimode Fiber) 20 Km (Singlemode Fiber) 80 Km (Singlemode Fiber)

LAN Technologies

10 Gig Ethernet
10 Gbps bandwidth. Uses same CSMA/CD media access protocol as in Ethernet. Propositioned for Metro-Ethernet Maximum Segment Length
1000 Base-T 10GBase-LR 10GBase-ER - Not available - 10 Km (Singlemode Fiber) - 40 Km (Singlemode Fiber)

Multiple Access

Taxonomy of multiple-access protocols

Random Access Protocols


When node has packet to send
transmit at full channel data rate R. no a priori coordination among nodes

two or more transmitting nodes collision, random access MAC protocol specifies:
how to detect collisions how to recover from collisions (e.g., via delayed

retransmissions)

Examples of random access MAC protocols:


slotted ALOHA ALOHA CSMA, CSMA/CD, CSMA/CA

Evolution of CSMA/CD

ALOHA

The throughput for pure ALOHA is S = G e 2G . The maximum throughput Smax = 0.184 when G= (1/2).

Procedure for pure ALOHA protocol

Vulnerable time for pure ALOHA protocol

Slotted ALOHA:

The throughput for slotted ALOHA is S = G eG . The maximum throughput Smx = 0.368 when G = 1. a

Vulnerable time for slotted ALOHA protocol

Carrier Sense Multiple Access


CSMA: listen before transmit: If channel sensed idle: transmit entire frame If channel sensed busy, defer transmission

Human analogy: dont interrupt others!

collisions can still occur:


propagation delay means two nodes may not hear each others transmission

collision:
entire packet transmission time wasted

note:
role of distance & propagation delay in determining collision probability

Vulnerable time in CSMA

Behavior of three persistence methods

Flow diagram for three persistence methods

LAN Technologies

Ethernet CSMA/CD
CSMA/CD (carrier sense multiple with collision detection) media protocol is used. access access

Data is transmitted in the form of packets. Sense channel prior to actual packet transmission. Transmit packet only if channel is sensed idle; else, defer the transmission until channel becomes idle. After packet transmission is started, the node monitors its own transmission to see if the packet has experienced a collision. If the packet is observed to be undergoing a collision, the transmission is aborted and the packet is retransmitted after a random interval of time using Binary Exponential Backoff algorithm.

CSMA/CD (Collision Detection)


CSMA/CD: carrier sensing, deferral as in CSMA
collisions detected within short time colliding transmissions aborted, reducing channel

wastage

collision detection:
easy in wired LANs: measure signal strengths, compare

transmitted, received signals difficult in wireless LANs: receiver shut off while transmitting

human analogy: the polite conversationalist

Flow diagram for the CSMA/CD

CSMA/CA

Flow diagram for CSMA/CA

Controlled access method

Logical ring and physical topology in token-passing access method

Token Ring

Token Passing

Token Passing

Token Passing

Token Passing

Token Ring Frame

Вам также может понравиться