SlideShare une entreprise Scribd logo
1  sur  153
Medium Access(MAC) Sub-Layer
Multiple access Protocols
Topologies
Overview of IEEE Standard 802 for LANS and MANS
Introduction to Wireless Communication
Introduction to Bridge, Switch and Router
Elements of a wireless network
network
infrastructure
wireless hosts
 laptop, smartphone
 run applications
 may be stationary (non-
mobile) or mobile
 wireless does not
always mean mobility
Elements of a wireless network
network
infrastructure
base station
 typically connected to
wired network
 relay - responsible for
sending packets
between wired network
and wireless host(s) in
its “area”
 e.g., cell towers,
802.11 access
points
Elements of a wireless network
network
infrastructure
wireless link
 typically used to
connect mobile(s) to
base station
 also used as backbone
link
 multiple access
protocol coordinates
link access
 various data rates,
transmission distance
Elements of a wireless network
network
infrastructure
infrastructure mode
 base station connects
mobiles into wired
network
 handoff: mobile
changes base station
providing connection
into wired network
Elements of a wireless network
network
infrastructure
ad hoc mode
 no base stations
 nodes can only
transmit to other
nodes within link
coverage
 nodes organize
themselves into a
network: route
among themselves
Elements of a wireless network
Wireless Link Characteristics
important differences from wired link ….
– decreased signal strength: radio signal attenuates as it
propagates through matter (path loss)
– interference from other sources: standardized wireless
network frequencies (e.g., 2.4 GHz) shared by other
devices (e.g., phone); devices (motors) interfere as
well
– multipath propagation: radio signal reflects off
objects ground, arriving ad destination at slightly
different times
…. make communication across (even a point to point)
wireless link much more “difficult”
Wireless Link Characteristics
• SNR: signal-to-noise ratio
– larger SNR – easier to extract signal from noise (a “good
thing”)
• SNR versus BER tradeoffs
– given physical layer: increase power -> increase SNR->decrease
BER
Wireless network characteristics
Multiple wireless senders and receivers create additional
problems (beyond multiple access):
A
B
C
Hidden terminal problem
 B, A hear each other
 B, C hear each other
 A, C can not hear each other
means A, C unaware of their
interference at B
A B C
A’s signal
strength
space
C’s signal
strength
Signal attenuation:
 B, A hear each other
 B, C hear each other
 A, C can not hear each other
interfering at B
IEEE 802.11 Wireless LAN
802.11b
• 2.4-5 GHz unlicensed spectrum
• up to 11 Mbps
802.11n: multiple antennae
2.4-5 GHz range
up to 200 Mbps
802.11a
– 5-6 GHz range
– up to 54 Mbps
802.11g
– 2.4-5 GHz range
– up to 54 Mbps
 all use CSMA/CA for multiple access
 all have base-station and ad-hoc network versions
802.11 LAN architecture
 wireless host
communicates with base
station
 base station = access
point (AP)
 Basic Service Set (BSS)
(aka “cell”) in
infrastructure mode
contains:
 wireless hosts
 access point (AP): base
station
 ad hoc mode: hosts only
BSS 1
BSS 2
Internet
hub, switch
or router
802.11: Channels, association
• 802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels at
different frequencies
– AP admin chooses frequency for AP
– interference possible: channel can be same as that
chosen by neighboring AP!
• host: must associate with an AP
– scans channels, listening for beacon frames containing
AP’s name (SSID) and MAC address
– selects AP to associate with
– may perform authentication
– will typically run DHCP to get IP address in AP’s
subnet
802.11: passive/active scanning
AP 2AP 1
H1
BSS 2BSS 1
1
2
3
1
passive scanning:
(1) beacon frames sent from APs
(2) association Request frame sent:
H1 to selected AP
(3) association Response frame sent
from selected AP to H1
AP 2
AP 1
H1
BSS 2BSS 1
1
22
3
4
active scanning:
(1) Probe Request frame broadcast
from H1
(2) Probe Response frames sent
from APs
(3) Association Request frame sent:
H1 to selected AP
(4) Association Response frame sent
from selected AP to H1
IEEE 802.11: multiple access
• avoid collisions: 2+ nodes transmitting at same time
• 802.11: CSMA - sense before transmitting
– don’t collide with ongoing transmission by other node
• 802.11: no collision detection!
– difficult to receive (sense collisions) when transmitting due to weak
received signals (fading)
– can’t sense all collisions in any case: hidden terminal, fading
– goal: avoid collisions: CSMA/C(ollision)A(voidance)
space
A
B
C
A B C
A’s signal
strength
C’s signal
strength
IEEE 802.11 MAC Protocol: CSMA/CA
802.11 sender
1 if sense channel idle for DIFS then
transmit entire frame (no CD)
2 if sense channel busy then
start random backoff time
timer counts down while channel idle
transmit when timer expires
if no ACK, increase random backoff interval,
repeat 2
802.11 receiver
- if frame received OK
return ACK after SIFS (ACK needed due to
hidden terminal problem)
sender receiver
DIFS
data
SIFS
ACK
An Overview of Repeaters
• Used for extending the physical span of a
network
– An example is the extension of the distance
between a hub and a node
• Span is often limited by design considerations
• 10base5
– The span is limited to 500 meters
A Repeater Connection
Expanding the Span of the Network
Source: Black Box
Operations of a Repeater Within the
ISO OSI Model
• Operates at the lower level of the ISO OSI
model
– Physical layer
Medium
Physical
Layer
Repeater
Medium
Physical
Layer
An Overview of a Bridge
• A device used for connecting two LANs
operating under the same protocol
• Currently, the term bridge is loosely being
used to describe different interconnecting
devices
– Used now for connecting LANs operating under
different protocols as well
Purpose of a Bridge
• Facilitate the movement of data packet from
one network segment to another
• Not a sophisticated internetworking device
• Bridge does not perform the routing of
information to different segments of a
network
• Connects two network segments and not
multiple network segments
Bridge
Bridge : ISO-OSI Layer of Operation
X Medium X Medium
Physical
Layer
Physical
Layer
Data
Link
Layer
Data
Link
Layer
A simple bridge operates at the
second layer of the ISO model.
Practical Bridge Implementations
• Local Bridge
• Remote Bridge
Local and Remote Bridges
• Local bridge
– Connects two different LANs located locally
• Remote bridge
– Connects LAN segments that are geographically
apart
– An example is a device that provide dial-up access
to a LAN
Switch Definition and Purpose
• A switch is defined as a device that allows a
LAN to be segmented
– The segments will operate under the same
protocol
Difference Between a Switch and a
Bridge
• A switch focuses on segmenting a LAN
• A bridge is concerned with linking two
network segments that operate under
different protocols
Purpose of a Switch
• Improve the network performance and
reliability
• Better manage the network in general
Switching Technologies
• There are two major types of switching
technologies
– Cut-through
– Store-and-forward
Cut-Through Technology
• Reads only part of the packet
– The addresses header
– Packet is forwarded accordingly
• Bad packets are not filtered
Store-and-Forward Technology
• Entire packet is processed
• Packets are filtered
– Bad packets are filtered
Switching Technology Comparison
Header Sender’s Add Receivers Add Data
Cut-through
Store-and-forward
Switching Technology Operation at the
ISO Layer
• In each of the two cases of switching
technologies no protocol conversion takes
place
• Forwarding and filtering are done at the MAC
layer
The Purpose of a Router
• Connect LANs operating under different
protocols
• The LANs connected are better known as sub-
networks instead of network segments
– The term segments is nevertheless used in
practice
Router Characteristics
• A router true internetworking device
– Connects different sub-networks together
• Establishes a logical path of communication
between the sub-networks
• Contributes to the modular construction of a
network
– Network itself is better managed
– Network resources are better utilized
Internetworking with a Router
IEEE 802.3
Sub-network IEEE 802.5
Sub-network
PC-NFS
Sub-network
Router
Difference Between Routers, Switches
and Hubs
• Hubs
– Simply provides the mechanical and electrical
connections between the nodes
• Switches
– Examine the data packet for the destination
address
– Do not alter the data packets
• Routers
– Examine and alter the data packets
– Perform protocol conversion
Router Requirements
• Requires more processing power compared to
switches and bridges
• Operations fall within the network layer of the
ISO-OSI communication model
Router : Network Layer Interface
X MEDIUM X MEDIUM
PHYSICAL
LAYER
PHYSICAL
LAYER
DATA LINK
LAYER
DATA LINK
LAYER
NETWORK
LAYER
ROUTER
NETWORK
LAYER
Devices and Layers
PHYSICAL
LAYER
DATA LINK
LAYER
NETWORK
LAYER
Switches
Routers
Repeaters
Switches
Layer 1
Layer 2
Layer 3
An Introduction to Gateways
• Gateways are comprehensive internetworking
devices
• They can be computers themselves
Gateways in the Past
• Very popular
• They were the only devices that could be used
for internetworking
• Computers of the past were not designed with
network connections in mind
– Interconnection of different computer systems
has to be managed and driven by an advanced
device such as a gateway
The Present Scenario
• Computers are now designed with due
consideration given to network connections
• Larger networks could today be configured
using internetworking devices
– Routers, switches, hubs etc.
Gateway’s Functional Relationship to
the ISO-OSI Model
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
Presentation
Session
Transport
Network
Data Link
Physical
Link layer: introduction
terminology:
 hosts and routers: nodes
 communication channels that
connect adjacent nodes along
communication path: links
 wired links
 wireless links
 LANs
 layer-2 packet: frame,
encapsulates datagram
data-link layer has responsibility of
transferring datagram from one node
to physically adjacent node over a link
global ISP
Link layer: context
 datagram transferred by
different link protocols over
different links:
 e.g., Ethernet on first link,
frame relay on
intermediate links, 802.11
on last link
 each link protocol provides
different services
 e.g., may or may not
provide rdt over link
transportation analogy:
 trip from Princeton to Lausanne
 limo: Princeton to JFK
 plane: JFK to Geneva
 train: Geneva to Lausanne
 tourist = datagram
 transport segment =
communication link
 transportation mode = link
layer protocol
 travel agent = routing
algorithm
Link layer services
• framing, link access:
– encapsulate datagram into frame, adding
header, trailer
– channel access if shared medium
– “MAC” addresses used in frame headers to
identify source, dest
• different from IP address!
• reliable delivery between adjacent nodes
– seldom used on low bit-error link (fiber, some
twisted pair)
– wireless links: high error rates
flow control:
 pacing between adjacent sending and receiving nodes
error detection:
 errors caused by signal attenuation, noise.
 receiver detects presence of errors:
• signals sender for retransmission or drops frame
error correction:
 receiver identifies and corrects bit error(s) without resorting to
retransmission
half-duplex and full-duplex
 with half duplex, nodes at both ends of link can transmit, but not
at same time
Link layer services (more)
Where is the link layer implemented?
• in each and every host
• link layer implemented in
“adaptor” (aka network
interface card NIC) or on a
chip
– Ethernet card, 802.11
card; Ethernet chipset
– implements link, physical
layer
• attaches into host’s system
buses
• combination of hardware,
software, firmware
controller
physical
transmission
cpu memory
host
bus
(e.g., PCI)
network adapter
card
application
transport
network
link
link
physical
Adaptors communicating
 sending side:
 encapsulates datagram
in frame
 adds error checking bits,
rdt, flow control, etc.
 receiving side
 looks for errors, rdt, flow
control, etc
 extracts datagram,
passes to upper layer at
receiving side
controller controller
sending host receiving host
datagram datagram
datagram
frame
Error detection
EDC= Error Detection and Correction bits (redundancy)
D = Data protected by error checking, may include header fields
• Error detection not 100% reliable!
• protocol may miss some errors, but rarely
• larger EDC field yields better detection and correction
otherwise
Parity checking
single bit parity:
 detect single bit
errors
two-dimensional bit parity:
 detect and correct single bit errors
0 0
Internet checksum (review)
sender:
• treat segment contents
as sequence of 16-bit
integers
• checksum: addition (1’s
complement sum) of
segment contents
• sender puts checksum
value into UDP checksum
field
receiver:
 compute checksum of
received segment
 check if computed
checksum equals checksum
field value:
 NO - error detected
 YES - no error detected.
But maybe errors
nonetheless?
goal: detect “errors” (e.g., flipped bits) in transmitted
packet (note: used at transport layer only)
Cyclic redundancy check
 more powerful error-detection coding
 view data bits, D, as a binary number
 choose r+1 bit pattern (generator), G
 goal: choose r CRC bits, R, such that
 <D,R> exactly divisible by G (modulo 2)
 receiver knows G, divides <D,R> by G. If non-zero remainder:
error detected!
 can detect all burst errors less than r+1 bits
 widely used in practice (Ethernet, 802.11 WiFi, ATM)
CRC example
want:
D.2r XOR R = nG
equivalently:
D.2r = nG XOR R
equivalently:
if we divide D.2r by
G, want remainder
R to satisfy:
R = remainder[ ]
D.2r
G
Multiple access links, protocols
two types of “links”:
• point-to-point
– PPP for dial-up access
– point-to-point link between Ethernet switch, host
• broadcast (shared wire or medium)
– old-fashioned Ethernet
– upstream HFC
– 802.11 wireless LAN
shared wire (e.g.,
cabled Ethernet)
shared RF
(e.g., 802.11 WiFi)
shared RF
(satellite)
humans at a
cocktail party
(shared air, acoustical)
Multiple access protocols
 single shared broadcast channel
 two or more simultaneous transmissions by nodes:
interference
 collision if node receives two or more signals at the
same time
multiple access protocol
 distributed algorithm that determines how nodes share
channel, i.e., determine when node can transmit
 communication about channel sharing must use channel itself!
 no out-of-band channel for coordination
An ideal multiple access protocol
given: broadcast channel of rate R bps
desiderata:
1. when one node wants to transmit, it can send at
rate R.
2. when M nodes want to transmit, each can send at
average rate R/M
3. fully decentralized:
• no special node to coordinate transmissions
• no synchronization of clocks, slots
4. simple
MAC protocols: taxonomy
three broad classes:
• channel partitioning
– divide channel into smaller “pieces” (time slots, frequency, code)
– allocate piece to node for exclusive use
• random access
– channel not divided, allow collisions
– “recover” from collisions
• “taking turns”
– nodes take turns, but nodes with more to send can take longer
turns
Channel partitioning MAC protocols: TDMA
TDMA: time division multiple access
access to channel in "rounds"
each station gets fixed length slot (length =
pkt trans time) in each round
unused slots go idle
example: 6-station LAN, 1,3,4 have pkt,
slots 2,5,6 idle
1 3 4 1 3 4
6-slot
frame
6-slot
frame
FDMA: frequency division multiple access
 channel spectrum divided into frequency bands
 each station assigned fixed frequency band
 unused transmission time in frequency bands go idle
 example: 6-station LAN, 1,3,4 have pkt, frequency bands 2,5,6
idle
frequencybands
FDM cable
Channel partitioning MAC protocols: FDMA
Random access protocols
• when node has packet to send
– transmit at full channel data rate R.
– no a priori coordination among nodes
• two or more transmitting nodes ➜
“collision”,
• random access MAC protocol specifies:
– how to detect collisions
– how to recover from collisions (e.g., via
delayed retransmissions)
• examples of random access MAC protocols:
– slotted ALOHA
– ALOHA
– CSMA, CSMA/CD, CSMA/CA
Slotted ALOHA
assumptions:
 all frames same size
 time divided into equal size
slots (time to transmit 1
frame)
 nodes start to transmit only
slot beginning
 nodes are synchronized
 if 2 or more nodes transmit
in slot, all nodes detect
collision
operation:
 when node obtains fresh
frame, transmits in next slot
 if no collision: node can
send new frame in next
slot
 if collision: node
retransmits frame in each
subsequent slot with prob.
p until success
Pros:
 single active node can
continuously transmit at
full rate of channel
 highly decentralized: only
slots in nodes need to be
in sync
 simple
Cons:
 collisions, wasting slots
 idle slots
 nodes may be able to
detect collision in less
than time to transmit
packet
 clock synchronization
Slotted ALOHA
1 1 1 1
2
3
2 2
3 3
node 1
node 2
node 3
C C CS S SE E E
 suppose: N nodes with
many frames to send,
each transmits in slot with
probability p
 prob that given node has
success in a slot = p(1-p)N-
1
 prob that any node has a
success = Np(1-p)N-1
 max efficiency: find p*
that maximizes
Np(1-p)N-1
 for many nodes, take limit
of Np*(1-p*)N-1 as N goes
to infinity, gives:
max efficiency = 1/e = .37
efficiency: long-run
fraction of successful
slots
(many nodes, all with
many frames to send)
at best: channel
used for useful
transmissions
37%
of time!
!
Slotted ALOHA: efficiency
Pure (unslotted) ALOHA
 unslotted Aloha: simpler, no synchronization
 when frame first arrives
 transmit immediately
 collision probability increases:
 frame sent at t0 collides with other frames sent in
[t0-1,t0+1]
Pure ALOHA efficiency
P(success by given node) = P(node transmits) .
P(no other node transmits in [t0-1,t0] .
P(no other node transmits in [t0-1,t0]
= p . (1-p)N-1 . (1-p)N-1
= p . (1-p)2(N-1)
… choosing optimum p and then letting n
= 1/(2e) = .18
even worse than slotted Aloha!
CSMA (carrier sense multiple access)
CSMA: listen before transmit:
if channel sensed idle: transmit entire frame
• if channel sensed busy, defer transmission
• human analogy: don’t interrupt others!
CSMA collisions
• collisions can still occur:
propagation delay
means two nodes may
not hear each other’s
transmission
• collision: entire packet
transmission time
wasted
– distance & propagation
delay play role in in
determining collision
probability
spatial layout of nodes
CSMA/CD (collision detection)
CSMA/CD: carrier sensing, deferral as in CSMA
 collisions detected within short time
 colliding transmissions aborted, reducing channel
wastage
collision detection:
 easy in wired LANs: measure signal strengths,
compare transmitted, received signals
 difficult in wireless LANs: received signal strength
overwhelmed by local transmission strength
human analogy: the polite conversationalist
CSMA/CD (collision detection)
spatial layout of nodes
Ethernet CSMA/CD algorithm
1. NIC receives datagram
from network layer,
creates frame
2. If NIC senses channel idle,
starts frame transmission.
If NIC senses channel
busy, waits until channel
idle, then transmits.
3. If NIC transmits entire
frame without detecting
another transmission, NIC
is done with frame !
4. If NIC detects another
transmission while
transmitting, aborts and
sends jam signal
5. After aborting, NIC enters
binary (exponential)
backoff:
– after mth collision, NIC
chooses K at random
from {0,1,2, …, 2m-1}.
NIC waits K·512 bit
times, returns to Step 2
– longer backoff interval
CSMA/CD efficiency
 Tprop = max prop delay between 2 nodes in LAN
 ttrans = time to transmit max-size frame
 efficiency goes to 1
 as tprop goes to 0
 as ttrans goes to infinity
 better performance than ALOHA: and simple, cheap,
decentralized!
transprop /tt
efficiency
51
1


“Taking turns” MAC protocols
channel partitioning MAC protocols:
– share channel efficiently and fairly at high load
– inefficient at low load: delay in channel access,
1/N bandwidth allocated even if only 1 active
node!
random access MAC protocols
– efficient at low load: single node can fully utilize
channel
– high load: collision overhead
“taking turns” protocols
polling:
• master node “invites”
slave nodes to transmit
in turn
• typically used with
“dumb” slave devices
• concerns:
– polling overhead
– latency
– single point of
failure (master)
master
slaves
poll
data
data
“Taking turns” MAC protocols
token passing:
 control token passed
from one node to next
sequentially.
 token message
 concerns:
 token overhead
 latency
 single point of failure
(token)
T
data
(nothing
to send)
T
“Taking turns” MAC protocols
MAC addresses and ARP
• 32-bit IP address:
– network-layer address for interface
– used for layer 3 (network layer) forwarding
• MAC (or LAN or physical or Ethernet) address:
– function: used ‘locally” to get frame from one
interface to another physically-connected interface
(same network, in IP-addressing sense)
– 48 bit MAC address (for most LANs) burned in NIC
ROM, also sometimes software settable
– e.g.: 1A-2F-BB-76-09-AD
hexadecimal (base 16) notation
(each “number” represents 4 bits)
LAN addresses and ARP
each adapter on LAN has unique LAN address
adapter
1A-2F-BB-76-09-AD
58-23-D7-FA-20-B0
0C-C4-11-6F-E3-98
71-65-F7-2B-08-53
LAN
(wired or
wireless)
LAN addresses (more)
MAC address allocation administered by IEEE
manufacturer buys portion of MAC address
space (to assure uniqueness)
analogy:
 MAC address: like Social Security Number
 IP address: like postal address
 MAC flat address ➜ portability
 can move LAN card from one LAN to another
IP hierarchical address not portable
ARP: address resolution protocol
ARP table: each IP node (host,
router) on LAN has table
 IP/MAC address
mappings for some
LAN nodes:
< IP address; MAC address; TTL>
 TTL (Time To Live):
time after which
address mapping will
be forgotten
(typically 20 min)
Question: how to determine
interface’s MAC address,
knowing its IP address?
1A-2F-BB-76-09-AD
58-23-D7-FA-20-B0
0C-C4-11-6F-E3-98
71-65-F7-2B-08-53
LAN
137.196.7.23
137.196.7.78
137.196.7.14
137.196.7.88
ARP protocol: same LAN
• A wants to send datagram
to B
– B’s MAC address not in A’s
ARP table.
• A broadcasts ARP query
packet, containing B's IP
address
– dest MAC address = FF-FF-
FF-FF-FF-FF
– all nodes on LAN receive
ARP query
• B receives ARP packet,
replies to A with its (B's)
MAC address
– frame sent to A’s MAC
• A caches (saves) IP-to-
MAC address pair in its
ARP table until
information becomes old
(times out)
– soft state: information that
times out (goes away)
unless refreshed
• ARP is “plug-and-play”:
– nodes create their ARP
tables without intervention
from net administrator
walkthrough: send datagram from A to B via R
– focus on addressing – at IP (datagram) and MAC layer
(frame)
– assume A knows B’s IP address
– assume A knows IP address of first hop router, R
(how?)
– assume A knows R’s MAC address (how?)
Addressing: routing to another LAN
R
1A-23-F9-CD-06-9B
222.222.222.220
111.111.111.110
E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D
111.111.111.112
111.111.111.111
74-29-9C-E8-FF-55
A
222.222.222.222
49-BD-D2-C7-56-2A
222.222.222.221
88-B2-2F-54-1A-0F
B
R
1A-23-F9-CD-06-9B
222.222.222.220
111.111.111.110
E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D
111.111.111.112
111.111.111.111
74-29-9C-E8-FF-55
A
222.222.222.222
49-BD-D2-C7-56-2A
222.222.222.221
88-B2-2F-54-1A-0F
B
Addressing: routing to another LAN
IP
Eth
Phy
IP src: 111.111.111.111
IP dest: 222.222.222.222
 A creates IP datagram with IP source A, destination B
 A creates link-layer frame with R's MAC address as dest, frame
contains A-to-B IP datagram
MAC src: 74-29-9C-E8-FF-55
MAC dest: E6-E9-00-17-BB-4B
R
1A-23-F9-CD-06-9B
222.222.222.220
111.111.111.110
E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D
111.111.111.112
111.111.111.111
74-29-9C-E8-FF-55
A
222.222.222.222
49-BD-D2-C7-56-2A
222.222.222.221
88-B2-2F-54-1A-0F
B
Addressing: routing to another LAN
IP
Eth
Phy
 frame sent from A to R
IP
Eth
Phy
 frame received at R, datagram removed, passed up to IP
MAC src: 74-29-9C-E8-FF-55
MAC dest: E6-E9-00-17-BB-4B
IP src: 111.111.111.111
IP dest: 222.222.222.222
IP src: 111.111.111.111
IP dest: 222.222.222.222
R
1A-23-F9-CD-06-9B
222.222.222.220
111.111.111.110
E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D
111.111.111.112
111.111.111.111
74-29-9C-E8-FF-55
A
222.222.222.222
49-BD-D2-C7-56-2A
222.222.222.221
88-B2-2F-54-1A-0F
B
Addressing: routing to another LAN
IP src: 111.111.111.111
IP dest: 222.222.222.222
 R forwards datagram with IP source A, destination B
 R creates link-layer frame with B's MAC address as dest, frame
contains A-to-B IP datagram
MAC src: 1A-23-F9-CD-06-9B
MAC dest: 49-BD-D2-C7-56-2A
IP
Eth
Phy
IP
Eth
Phy
R
1A-23-F9-CD-06-9B
222.222.222.220
111.111.111.110
E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D
111.111.111.112
111.111.111.111
74-29-9C-E8-FF-55
A
222.222.222.222
49-BD-D2-C7-56-2A
222.222.222.221
88-B2-2F-54-1A-0F
B
Addressing: routing to another LAN
 R forwards datagram with IP source A, destination B
 R creates link-layer frame with B's MAC address as dest, frame
contains A-to-B IP datagram
IP src: 111.111.111.111
IP dest: 222.222.222.222
MAC src: 1A-23-F9-CD-06-9B
MAC dest: 49-BD-D2-C7-56-2A
IP
Eth
Phy
IP
Eth
Phy
R
1A-23-F9-CD-06-9B
222.222.222.220
111.111.111.110
E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D
111.111.111.112
111.111.111.111
74-29-9C-E8-FF-55
A
222.222.222.222
49-BD-D2-C7-56-2A
222.222.222.221
88-B2-2F-54-1A-0F
B
Addressing: routing to another LAN
 R forwards datagram with IP source A, destination B
 R creates link-layer frame with B's MAC address as dest, frame
contains A-to-B IP datagram
IP src: 111.111.111.111
IP dest: 222.222.222.222
MAC src: 1A-23-F9-CD-06-9B
MAC dest: 49-BD-D2-C7-56-2A
IP
Eth
Phy
Ethernet
“dominant” wired LAN technology:
• cheap $20 for NIC
• first widely used LAN technology
• simpler, cheaper than token LANs and ATM
• kept up with speed race: 10 Mbps – 10 Gbps
Metcalfe’s Ethernet sketch
Ethernet: physical topology
• bus: popular through mid 90s
– all nodes in same collision domain (can collide with
each other)
• star: prevails today
– active switch in center
– each “spoke” runs a (separate) Ethernet protocol
(nodes do not collide with each other)
switch
bus: coaxial cable
star
Ethernet frame structure
sending adapter encapsulates IP datagram (or
other network layer protocol packet) in
Ethernet frame
preamble:
7 bytes with pattern 10101010 followed by
one byte with pattern 10101011
 used to synchronize receiver, sender clock
dest.
address
source
address
data
(payload) CRCpreamble
type
Ethernet frame structure (more)
addresses: 6 byte source, destination MAC
addresses
 if adapter receives frame with matching
destination address, or with broadcast address
(e.g. ARP packet), it passes data in frame to
network layer protocol
 otherwise, adapter discards frame
type: indicates higher layer protocol (mostly IP
but others possible, e.g., Novell IPX, AppleTalk)
CRC: cyclic redundancy check at receiver
 error detected: frame is dropped
dest.
address
source
address
data
(payload) CRCpreamble
type
Ethernet: unreliable, connectionless
• connectionless: no handshaking between
sending and receiving NICs
• unreliable: receiving NIC doesnt send acks or
nacks to sending NIC
– data in dropped frames recovered only if initial
sender uses higher layer rdt (e.g., TCP), otherwise
dropped data lost
Switch: multiple simultaneous transmissions
• hosts have dedicated, direct
connection to switch
• switches buffer packets
• Ethernet protocol used on each
incoming link, but no collisions;
full duplex
– each link is its own
collision domain
• switching: A-to-A’ and B-to-B’
can transmit simultaneously,
without collisions switch with six interfaces
(1,2,3,4,5,6)
A
A’
B
B’ C
C’
1 2
345
6
Switch forwarding table
Q: how does switch know
A’ reachable via interface 4,
B’ reachable via interface
5?
switch with six interfaces
(1,2,3,4,5,6)
A
A’
B
B’ C
C’
1 2
345
6 A: each switch has a
switch table, each entry:
 (MAC address of host,
interface to reach host, time
stamp)
 looks like a routing table!
Q: how are entries created,
maintained in switch table?
 something like a routing
protocol?
A
A’
B
B’ C
C’
1 2
345
6
Switch: self-learning
• switch learns which hosts
can be reached through
which interfaces
– when frame
received, switch
“learns” location of
sender: incoming
LAN segment
– records
sender/location pair
in switch table
A A’
Source: A
Dest: A’
MAC addr interface TTL
Switch table
(initially empty)
A 1 60
A
A’
B
B’ C
C’
1 2
345
6
Self-learning, forwarding: example
A A’
Source: A
Dest: A’
MAC addr interface TTL
switch table
(initially empty)
A 1 60
A A’A A’A A’A A’A A’
• frame destination, A’,
locaton unknown:flood
A’ A
 destination A location
known:
A’ 4 60
selectively
send
on just one link
Interconnecting switches
switches can be connected together
Q: sending from A to G - how does S1 know to
forward frame destined to F via S4 and S3?
 A: self learning! (works exactly the same as in
single-switch case!)
A
B
S1
C D
E
F
S2
S4
S3
H
I
G
Self-learning multi-switch example
Suppose C sends frame to I, I responds to C
 Q: show switch tables and packet forwarding in S1,
S2, S3, S4
A
B
S1
C D
E
F
S2
S4
S3
H
I
G
Switches vs. routers
both are store-and-forward:
 routers: network-layer
devices (examine network-
layer headers)
 switches: link-layer devices
(examine link-layer
headers)
both have forwarding tables:
 routers: compute tables
using routing algorithms, IP
addresses
 switches: learn forwarding
table using flooding,
learning, MAC addresses
application
transport
network
link
physical
network
link
physical
link
physical
switch
datagram
application
transport
network
link
physical
frame
frame
frame
datagram
VLANs: motivation
consider:
 CS user moves office to EE,
but wants connect to CS
switch?
 single broadcast domain:
 all layer-2 broadcast
traffic (ARP, DHCP,
unknown location of
destination MAC
address) must cross
entire LAN
 security/privacy,
Computer
Science Electrical
Engineering
Computer
Engineering
VLANs
port-based VLAN: switch ports
grouped (by switch management
software) so that single physical
switch ……
switch(es) supporting
VLAN capabilities can
be configured to
define multiple virtual
LANS over single
physical LAN
infrastructure.
Virtual Local
Area Network
1
8
9
16102
7
…
Electrical Engineering
(VLAN ports 1-8)
Computer Science
(VLAN ports 9-15)
15
…
Electrical Engineering
(VLAN ports 1-8)
…
1
82
7 9
1610
15
…
Computer Science
(VLAN ports 9-16)
… operates as multiple virtual
switches
Port-based VLAN
1
8
9
16102
7
…
Electrical Engineering
(VLAN ports 1-8)
Computer Science
(VLAN ports 9-15)
15
…
 traffic isolation: frames
to/from ports 1-8 can only
reach ports 1-8
 can also define VLAN based on
MAC addresses of endpoints,
rather than switch port
 dynamic membership:
ports can be dynamically
assigned among VLANs
router
 forwarding between VLANS:
done via routing (just as with
separate switches)
 in practice vendors sell combined
switches plus routers

Contenu connexe

Tendances

Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
Generations of Mobile Communications
Generations of Mobile CommunicationsGenerations of Mobile Communications
Generations of Mobile Communicationssivakumar m
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmissionRajapriya82
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link LayerAbdullaziz Tagawy
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Transmission Media
Transmission MediaTransmission Media
Transmission MediaSourav Roy
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATMMadhumita Tamhane
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
 
The mac layer
The mac layerThe mac layer
The mac layeraazamk
 

Tendances (20)

Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
Generations of Mobile Communications
Generations of Mobile CommunicationsGenerations of Mobile Communications
Generations of Mobile Communications
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
Mac layer
Mac  layerMac  layer
Mac layer
 
WLAN
WLANWLAN
WLAN
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Osi model
Osi modelOsi model
Osi model
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
ccna networking ppt
ccna networking pptccna networking ppt
ccna networking ppt
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)
 
The mac layer
The mac layerThe mac layer
The mac layer
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 

En vedette

Computer Communication Architecture
Computer Communication ArchitectureComputer Communication Architecture
Computer Communication ArchitectureKamal Acharya
 
Overview of Digital Communication
Overview of Digital CommunicationOverview of Digital Communication
Overview of Digital CommunicationKamal Acharya
 
Data Communication Principles
Data Communication PrinciplesData Communication Principles
Data Communication PrinciplesKamal Acharya
 
Overview of the graphics system
Overview of the graphics systemOverview of the graphics system
Overview of the graphics systemKamal Acharya
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access ProtocolsPruthviraj Konu
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniquesGupta6Bindu
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Computer Architecture and organization
Computer Architecture and organizationComputer Architecture and organization
Computer Architecture and organizationBadrinath Kadam
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniquestameemyousaf
 
Computer architecture and organization
Computer architecture and organizationComputer architecture and organization
Computer architecture and organizationTushar B Kute
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
 
Content Delivery Network
Content Delivery NetworkContent Delivery Network
Content Delivery NetworkShiv Pandey
 

En vedette (19)

Computer Communication Architecture
Computer Communication ArchitectureComputer Communication Architecture
Computer Communication Architecture
 
Overview of Digital Communication
Overview of Digital CommunicationOverview of Digital Communication
Overview of Digital Communication
 
Data Link Layer
Data Link LayerData Link Layer
Data Link Layer
 
Data Communication Principles
Data Communication PrinciplesData Communication Principles
Data Communication Principles
 
Overview of the graphics system
Overview of the graphics systemOverview of the graphics system
Overview of the graphics system
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Routing Algorithm
Routing AlgorithmRouting Algorithm
Routing Algorithm
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Switching seminar ppt
Switching seminar pptSwitching seminar ppt
Switching seminar ppt
 
Computer Architecture and organization
Computer Architecture and organizationComputer Architecture and organization
Computer Architecture and organization
 
FDMA-TDMA-CDMA
FDMA-TDMA-CDMAFDMA-TDMA-CDMA
FDMA-TDMA-CDMA
 
Switching
SwitchingSwitching
Switching
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Computer architecture and organization
Computer architecture and organizationComputer architecture and organization
Computer architecture and organization
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
Content Delivery Network
Content Delivery NetworkContent Delivery Network
Content Delivery Network
 

Similaire à Media Access Layer

Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client AdaptersYaser Rahmati
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lanMohd Arif
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Ashish Khare
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1Mayur Garg
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 
CN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfCN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfADARSHN40
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareokelloerick
 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdfwaqas232871
 
lecture666.ppt
lecture666.pptlecture666.ppt
lecture666.pptrajucs
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)Dhani Ahmad
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overviewSyaiful Ahdan
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01techbed
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Raj vardhan
 

Similaire à Media Access Layer (20)

Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client AdaptersCisco WLAN -  Chapter. 02 :  Part 1 – 802.11 MAC and Cisco Client Adapters
Cisco WLAN - Chapter. 02 : Part 1 – 802.11 MAC and Cisco Client Adapters
 
awsn module 1.ppt
awsn module 1.pptawsn module 1.ppt
awsn module 1.ppt
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Wlan
WlanWlan
Wlan
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)Lecture6(Wireless La Ns)
Lecture6(Wireless La Ns)
 
Rj wlan
Rj wlanRj wlan
Rj wlan
 
Wireless presentation-1
Wireless presentation-1Wireless presentation-1
Wireless presentation-1
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
CN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdfCN 5151(15) Module I part 1.3 21072020.pdf
CN 5151(15) Module I part 1.3 21072020.pdf
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
WiFi Networks.pdf
WiFi Networks.pdfWiFi Networks.pdf
WiFi Networks.pdf
 
lecture666.ppt
lecture666.pptlecture666.ppt
lecture666.ppt
 
Lecture6
Lecture6Lecture6
Lecture6
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Network devices (2)
Network devices (2)Network devices (2)
Network devices (2)
 
Dc ch08 : local area network overview
Dc ch08 : local area network overviewDc ch08 : local area network overview
Dc ch08 : local area network overview
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
 
Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture Wireless LANs(IEEE802.11) Architecture
Wireless LANs(IEEE802.11) Architecture
 

Plus de Kamal Acharya

Programming the basic computer
Programming the basic computerProgramming the basic computer
Programming the basic computerKamal Acharya
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer SecurityKamal Acharya
 
Making decision and repeating in PHP
Making decision and repeating  in PHPMaking decision and repeating  in PHP
Making decision and repeating in PHPKamal Acharya
 
Working with arrays in php
Working with arrays in phpWorking with arrays in php
Working with arrays in phpKamal Acharya
 
Text and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPText and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPKamal Acharya
 
Capacity Planning of Data Warehousing
Capacity Planning of Data WarehousingCapacity Planning of Data Warehousing
Capacity Planning of Data WarehousingKamal Acharya
 
Information Privacy and Data Mining
Information Privacy and Data MiningInformation Privacy and Data Mining
Information Privacy and Data MiningKamal Acharya
 
Association Analysis in Data Mining
Association Analysis in Data MiningAssociation Analysis in Data Mining
Association Analysis in Data MiningKamal Acharya
 
Classification techniques in data mining
Classification techniques in data miningClassification techniques in data mining
Classification techniques in data miningKamal Acharya
 
Introduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingIntroduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingKamal Acharya
 

Plus de Kamal Acharya (20)

Programming the basic computer
Programming the basic computerProgramming the basic computer
Programming the basic computer
 
Computer Arithmetic
Computer ArithmeticComputer Arithmetic
Computer Arithmetic
 
Introduction to Computer Security
Introduction to Computer SecurityIntroduction to Computer Security
Introduction to Computer Security
 
Session and Cookies
Session and CookiesSession and Cookies
Session and Cookies
 
Functions in php
Functions in phpFunctions in php
Functions in php
 
Web forms in php
Web forms in phpWeb forms in php
Web forms in php
 
Making decision and repeating in PHP
Making decision and repeating  in PHPMaking decision and repeating  in PHP
Making decision and repeating in PHP
 
Working with arrays in php
Working with arrays in phpWorking with arrays in php
Working with arrays in php
 
Text and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHPText and Numbers (Data Types)in PHP
Text and Numbers (Data Types)in PHP
 
Introduction to PHP
Introduction to PHPIntroduction to PHP
Introduction to PHP
 
Capacity Planning of Data Warehousing
Capacity Planning of Data WarehousingCapacity Planning of Data Warehousing
Capacity Planning of Data Warehousing
 
Data Warehousing
Data WarehousingData Warehousing
Data Warehousing
 
Search Engines
Search EnginesSearch Engines
Search Engines
 
Web Mining
Web MiningWeb Mining
Web Mining
 
Information Privacy and Data Mining
Information Privacy and Data MiningInformation Privacy and Data Mining
Information Privacy and Data Mining
 
Cluster Analysis
Cluster AnalysisCluster Analysis
Cluster Analysis
 
Association Analysis in Data Mining
Association Analysis in Data MiningAssociation Analysis in Data Mining
Association Analysis in Data Mining
 
Classification techniques in data mining
Classification techniques in data miningClassification techniques in data mining
Classification techniques in data mining
 
Data Preprocessing
Data PreprocessingData Preprocessing
Data Preprocessing
 
Introduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data WarehousingIntroduction to Data Mining and Data Warehousing
Introduction to Data Mining and Data Warehousing
 

Dernier

Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Dernier (20)

Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Media Access Layer

  • 1. Medium Access(MAC) Sub-Layer Multiple access Protocols Topologies Overview of IEEE Standard 802 for LANS and MANS Introduction to Wireless Communication Introduction to Bridge, Switch and Router
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54. Elements of a wireless network network infrastructure
  • 55. wireless hosts  laptop, smartphone  run applications  may be stationary (non- mobile) or mobile  wireless does not always mean mobility Elements of a wireless network network infrastructure
  • 56. base station  typically connected to wired network  relay - responsible for sending packets between wired network and wireless host(s) in its “area”  e.g., cell towers, 802.11 access points Elements of a wireless network network infrastructure
  • 57. wireless link  typically used to connect mobile(s) to base station  also used as backbone link  multiple access protocol coordinates link access  various data rates, transmission distance Elements of a wireless network network infrastructure
  • 58. infrastructure mode  base station connects mobiles into wired network  handoff: mobile changes base station providing connection into wired network Elements of a wireless network network infrastructure
  • 59. ad hoc mode  no base stations  nodes can only transmit to other nodes within link coverage  nodes organize themselves into a network: route among themselves Elements of a wireless network
  • 60. Wireless Link Characteristics important differences from wired link …. – decreased signal strength: radio signal attenuates as it propagates through matter (path loss) – interference from other sources: standardized wireless network frequencies (e.g., 2.4 GHz) shared by other devices (e.g., phone); devices (motors) interfere as well – multipath propagation: radio signal reflects off objects ground, arriving ad destination at slightly different times …. make communication across (even a point to point) wireless link much more “difficult”
  • 61. Wireless Link Characteristics • SNR: signal-to-noise ratio – larger SNR – easier to extract signal from noise (a “good thing”) • SNR versus BER tradeoffs – given physical layer: increase power -> increase SNR->decrease BER
  • 62. Wireless network characteristics Multiple wireless senders and receivers create additional problems (beyond multiple access): A B C Hidden terminal problem  B, A hear each other  B, C hear each other  A, C can not hear each other means A, C unaware of their interference at B A B C A’s signal strength space C’s signal strength Signal attenuation:  B, A hear each other  B, C hear each other  A, C can not hear each other interfering at B
  • 63. IEEE 802.11 Wireless LAN 802.11b • 2.4-5 GHz unlicensed spectrum • up to 11 Mbps 802.11n: multiple antennae 2.4-5 GHz range up to 200 Mbps 802.11a – 5-6 GHz range – up to 54 Mbps 802.11g – 2.4-5 GHz range – up to 54 Mbps  all use CSMA/CA for multiple access  all have base-station and ad-hoc network versions
  • 64. 802.11 LAN architecture  wireless host communicates with base station  base station = access point (AP)  Basic Service Set (BSS) (aka “cell”) in infrastructure mode contains:  wireless hosts  access point (AP): base station  ad hoc mode: hosts only BSS 1 BSS 2 Internet hub, switch or router
  • 65. 802.11: Channels, association • 802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels at different frequencies – AP admin chooses frequency for AP – interference possible: channel can be same as that chosen by neighboring AP! • host: must associate with an AP – scans channels, listening for beacon frames containing AP’s name (SSID) and MAC address – selects AP to associate with – may perform authentication – will typically run DHCP to get IP address in AP’s subnet
  • 66. 802.11: passive/active scanning AP 2AP 1 H1 BSS 2BSS 1 1 2 3 1 passive scanning: (1) beacon frames sent from APs (2) association Request frame sent: H1 to selected AP (3) association Response frame sent from selected AP to H1 AP 2 AP 1 H1 BSS 2BSS 1 1 22 3 4 active scanning: (1) Probe Request frame broadcast from H1 (2) Probe Response frames sent from APs (3) Association Request frame sent: H1 to selected AP (4) Association Response frame sent from selected AP to H1
  • 67. IEEE 802.11: multiple access • avoid collisions: 2+ nodes transmitting at same time • 802.11: CSMA - sense before transmitting – don’t collide with ongoing transmission by other node • 802.11: no collision detection! – difficult to receive (sense collisions) when transmitting due to weak received signals (fading) – can’t sense all collisions in any case: hidden terminal, fading – goal: avoid collisions: CSMA/C(ollision)A(voidance) space A B C A B C A’s signal strength C’s signal strength
  • 68. IEEE 802.11 MAC Protocol: CSMA/CA 802.11 sender 1 if sense channel idle for DIFS then transmit entire frame (no CD) 2 if sense channel busy then start random backoff time timer counts down while channel idle transmit when timer expires if no ACK, increase random backoff interval, repeat 2 802.11 receiver - if frame received OK return ACK after SIFS (ACK needed due to hidden terminal problem) sender receiver DIFS data SIFS ACK
  • 69. An Overview of Repeaters • Used for extending the physical span of a network – An example is the extension of the distance between a hub and a node • Span is often limited by design considerations • 10base5 – The span is limited to 500 meters
  • 70. A Repeater Connection Expanding the Span of the Network Source: Black Box
  • 71. Operations of a Repeater Within the ISO OSI Model • Operates at the lower level of the ISO OSI model – Physical layer Medium Physical Layer Repeater Medium Physical Layer
  • 72. An Overview of a Bridge • A device used for connecting two LANs operating under the same protocol • Currently, the term bridge is loosely being used to describe different interconnecting devices – Used now for connecting LANs operating under different protocols as well
  • 73. Purpose of a Bridge • Facilitate the movement of data packet from one network segment to another • Not a sophisticated internetworking device • Bridge does not perform the routing of information to different segments of a network • Connects two network segments and not multiple network segments
  • 74. Bridge Bridge : ISO-OSI Layer of Operation X Medium X Medium Physical Layer Physical Layer Data Link Layer Data Link Layer A simple bridge operates at the second layer of the ISO model.
  • 75. Practical Bridge Implementations • Local Bridge • Remote Bridge
  • 76. Local and Remote Bridges • Local bridge – Connects two different LANs located locally • Remote bridge – Connects LAN segments that are geographically apart – An example is a device that provide dial-up access to a LAN
  • 77. Switch Definition and Purpose • A switch is defined as a device that allows a LAN to be segmented – The segments will operate under the same protocol
  • 78. Difference Between a Switch and a Bridge • A switch focuses on segmenting a LAN • A bridge is concerned with linking two network segments that operate under different protocols
  • 79. Purpose of a Switch • Improve the network performance and reliability • Better manage the network in general
  • 80. Switching Technologies • There are two major types of switching technologies – Cut-through – Store-and-forward
  • 81. Cut-Through Technology • Reads only part of the packet – The addresses header – Packet is forwarded accordingly • Bad packets are not filtered
  • 82. Store-and-Forward Technology • Entire packet is processed • Packets are filtered – Bad packets are filtered
  • 83. Switching Technology Comparison Header Sender’s Add Receivers Add Data Cut-through Store-and-forward
  • 84. Switching Technology Operation at the ISO Layer • In each of the two cases of switching technologies no protocol conversion takes place • Forwarding and filtering are done at the MAC layer
  • 85. The Purpose of a Router • Connect LANs operating under different protocols • The LANs connected are better known as sub- networks instead of network segments – The term segments is nevertheless used in practice
  • 86. Router Characteristics • A router true internetworking device – Connects different sub-networks together • Establishes a logical path of communication between the sub-networks • Contributes to the modular construction of a network – Network itself is better managed – Network resources are better utilized
  • 87. Internetworking with a Router IEEE 802.3 Sub-network IEEE 802.5 Sub-network PC-NFS Sub-network Router
  • 88. Difference Between Routers, Switches and Hubs • Hubs – Simply provides the mechanical and electrical connections between the nodes • Switches – Examine the data packet for the destination address – Do not alter the data packets • Routers – Examine and alter the data packets – Perform protocol conversion
  • 89. Router Requirements • Requires more processing power compared to switches and bridges • Operations fall within the network layer of the ISO-OSI communication model
  • 90. Router : Network Layer Interface X MEDIUM X MEDIUM PHYSICAL LAYER PHYSICAL LAYER DATA LINK LAYER DATA LINK LAYER NETWORK LAYER ROUTER NETWORK LAYER
  • 91. Devices and Layers PHYSICAL LAYER DATA LINK LAYER NETWORK LAYER Switches Routers Repeaters Switches Layer 1 Layer 2 Layer 3
  • 92. An Introduction to Gateways • Gateways are comprehensive internetworking devices • They can be computers themselves
  • 93. Gateways in the Past • Very popular • They were the only devices that could be used for internetworking • Computers of the past were not designed with network connections in mind – Interconnection of different computer systems has to be managed and driven by an advanced device such as a gateway
  • 94. The Present Scenario • Computers are now designed with due consideration given to network connections • Larger networks could today be configured using internetworking devices – Routers, switches, hubs etc.
  • 95. Gateway’s Functional Relationship to the ISO-OSI Model Application Presentation Session Transport Network Data Link Physical Application Presentation Session Transport Network Data Link Physical
  • 96. Link layer: introduction terminology:  hosts and routers: nodes  communication channels that connect adjacent nodes along communication path: links  wired links  wireless links  LANs  layer-2 packet: frame, encapsulates datagram data-link layer has responsibility of transferring datagram from one node to physically adjacent node over a link global ISP
  • 97. Link layer: context  datagram transferred by different link protocols over different links:  e.g., Ethernet on first link, frame relay on intermediate links, 802.11 on last link  each link protocol provides different services  e.g., may or may not provide rdt over link transportation analogy:  trip from Princeton to Lausanne  limo: Princeton to JFK  plane: JFK to Geneva  train: Geneva to Lausanne  tourist = datagram  transport segment = communication link  transportation mode = link layer protocol  travel agent = routing algorithm
  • 98. Link layer services • framing, link access: – encapsulate datagram into frame, adding header, trailer – channel access if shared medium – “MAC” addresses used in frame headers to identify source, dest • different from IP address! • reliable delivery between adjacent nodes – seldom used on low bit-error link (fiber, some twisted pair) – wireless links: high error rates
  • 99. flow control:  pacing between adjacent sending and receiving nodes error detection:  errors caused by signal attenuation, noise.  receiver detects presence of errors: • signals sender for retransmission or drops frame error correction:  receiver identifies and corrects bit error(s) without resorting to retransmission half-duplex and full-duplex  with half duplex, nodes at both ends of link can transmit, but not at same time Link layer services (more)
  • 100. Where is the link layer implemented? • in each and every host • link layer implemented in “adaptor” (aka network interface card NIC) or on a chip – Ethernet card, 802.11 card; Ethernet chipset – implements link, physical layer • attaches into host’s system buses • combination of hardware, software, firmware controller physical transmission cpu memory host bus (e.g., PCI) network adapter card application transport network link link physical
  • 101. Adaptors communicating  sending side:  encapsulates datagram in frame  adds error checking bits, rdt, flow control, etc.  receiving side  looks for errors, rdt, flow control, etc  extracts datagram, passes to upper layer at receiving side controller controller sending host receiving host datagram datagram datagram frame
  • 102. Error detection EDC= Error Detection and Correction bits (redundancy) D = Data protected by error checking, may include header fields • Error detection not 100% reliable! • protocol may miss some errors, but rarely • larger EDC field yields better detection and correction otherwise
  • 103. Parity checking single bit parity:  detect single bit errors two-dimensional bit parity:  detect and correct single bit errors 0 0
  • 104. Internet checksum (review) sender: • treat segment contents as sequence of 16-bit integers • checksum: addition (1’s complement sum) of segment contents • sender puts checksum value into UDP checksum field receiver:  compute checksum of received segment  check if computed checksum equals checksum field value:  NO - error detected  YES - no error detected. But maybe errors nonetheless? goal: detect “errors” (e.g., flipped bits) in transmitted packet (note: used at transport layer only)
  • 105. Cyclic redundancy check  more powerful error-detection coding  view data bits, D, as a binary number  choose r+1 bit pattern (generator), G  goal: choose r CRC bits, R, such that  <D,R> exactly divisible by G (modulo 2)  receiver knows G, divides <D,R> by G. If non-zero remainder: error detected!  can detect all burst errors less than r+1 bits  widely used in practice (Ethernet, 802.11 WiFi, ATM)
  • 106. CRC example want: D.2r XOR R = nG equivalently: D.2r = nG XOR R equivalently: if we divide D.2r by G, want remainder R to satisfy: R = remainder[ ] D.2r G
  • 107. Multiple access links, protocols two types of “links”: • point-to-point – PPP for dial-up access – point-to-point link between Ethernet switch, host • broadcast (shared wire or medium) – old-fashioned Ethernet – upstream HFC – 802.11 wireless LAN shared wire (e.g., cabled Ethernet) shared RF (e.g., 802.11 WiFi) shared RF (satellite) humans at a cocktail party (shared air, acoustical)
  • 108. Multiple access protocols  single shared broadcast channel  two or more simultaneous transmissions by nodes: interference  collision if node receives two or more signals at the same time multiple access protocol  distributed algorithm that determines how nodes share channel, i.e., determine when node can transmit  communication about channel sharing must use channel itself!  no out-of-band channel for coordination
  • 109. An ideal multiple access protocol given: broadcast channel of rate R bps desiderata: 1. when one node wants to transmit, it can send at rate R. 2. when M nodes want to transmit, each can send at average rate R/M 3. fully decentralized: • no special node to coordinate transmissions • no synchronization of clocks, slots 4. simple
  • 110. MAC protocols: taxonomy three broad classes: • channel partitioning – divide channel into smaller “pieces” (time slots, frequency, code) – allocate piece to node for exclusive use • random access – channel not divided, allow collisions – “recover” from collisions • “taking turns” – nodes take turns, but nodes with more to send can take longer turns
  • 111. Channel partitioning MAC protocols: TDMA TDMA: time division multiple access access to channel in "rounds" each station gets fixed length slot (length = pkt trans time) in each round unused slots go idle example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6 idle 1 3 4 1 3 4 6-slot frame 6-slot frame
  • 112. FDMA: frequency division multiple access  channel spectrum divided into frequency bands  each station assigned fixed frequency band  unused transmission time in frequency bands go idle  example: 6-station LAN, 1,3,4 have pkt, frequency bands 2,5,6 idle frequencybands FDM cable Channel partitioning MAC protocols: FDMA
  • 113. Random access protocols • when node has packet to send – transmit at full channel data rate R. – no a priori coordination among nodes • two or more transmitting nodes ➜ “collision”, • random access MAC protocol specifies: – how to detect collisions – how to recover from collisions (e.g., via delayed retransmissions) • examples of random access MAC protocols: – slotted ALOHA – ALOHA – CSMA, CSMA/CD, CSMA/CA
  • 114. Slotted ALOHA assumptions:  all frames same size  time divided into equal size slots (time to transmit 1 frame)  nodes start to transmit only slot beginning  nodes are synchronized  if 2 or more nodes transmit in slot, all nodes detect collision operation:  when node obtains fresh frame, transmits in next slot  if no collision: node can send new frame in next slot  if collision: node retransmits frame in each subsequent slot with prob. p until success
  • 115. Pros:  single active node can continuously transmit at full rate of channel  highly decentralized: only slots in nodes need to be in sync  simple Cons:  collisions, wasting slots  idle slots  nodes may be able to detect collision in less than time to transmit packet  clock synchronization Slotted ALOHA 1 1 1 1 2 3 2 2 3 3 node 1 node 2 node 3 C C CS S SE E E
  • 116.  suppose: N nodes with many frames to send, each transmits in slot with probability p  prob that given node has success in a slot = p(1-p)N- 1  prob that any node has a success = Np(1-p)N-1  max efficiency: find p* that maximizes Np(1-p)N-1  for many nodes, take limit of Np*(1-p*)N-1 as N goes to infinity, gives: max efficiency = 1/e = .37 efficiency: long-run fraction of successful slots (many nodes, all with many frames to send) at best: channel used for useful transmissions 37% of time! ! Slotted ALOHA: efficiency
  • 117. Pure (unslotted) ALOHA  unslotted Aloha: simpler, no synchronization  when frame first arrives  transmit immediately  collision probability increases:  frame sent at t0 collides with other frames sent in [t0-1,t0+1]
  • 118. Pure ALOHA efficiency P(success by given node) = P(node transmits) . P(no other node transmits in [t0-1,t0] . P(no other node transmits in [t0-1,t0] = p . (1-p)N-1 . (1-p)N-1 = p . (1-p)2(N-1) … choosing optimum p and then letting n = 1/(2e) = .18 even worse than slotted Aloha!
  • 119. CSMA (carrier sense multiple access) CSMA: listen before transmit: if channel sensed idle: transmit entire frame • if channel sensed busy, defer transmission • human analogy: don’t interrupt others!
  • 120. CSMA collisions • collisions can still occur: propagation delay means two nodes may not hear each other’s transmission • collision: entire packet transmission time wasted – distance & propagation delay play role in in determining collision probability spatial layout of nodes
  • 121. CSMA/CD (collision detection) CSMA/CD: carrier sensing, deferral as in CSMA  collisions detected within short time  colliding transmissions aborted, reducing channel wastage collision detection:  easy in wired LANs: measure signal strengths, compare transmitted, received signals  difficult in wireless LANs: received signal strength overwhelmed by local transmission strength human analogy: the polite conversationalist
  • 123. Ethernet CSMA/CD algorithm 1. NIC receives datagram from network layer, creates frame 2. If NIC senses channel idle, starts frame transmission. If NIC senses channel busy, waits until channel idle, then transmits. 3. If NIC transmits entire frame without detecting another transmission, NIC is done with frame ! 4. If NIC detects another transmission while transmitting, aborts and sends jam signal 5. After aborting, NIC enters binary (exponential) backoff: – after mth collision, NIC chooses K at random from {0,1,2, …, 2m-1}. NIC waits K·512 bit times, returns to Step 2 – longer backoff interval
  • 124. CSMA/CD efficiency  Tprop = max prop delay between 2 nodes in LAN  ttrans = time to transmit max-size frame  efficiency goes to 1  as tprop goes to 0  as ttrans goes to infinity  better performance than ALOHA: and simple, cheap, decentralized! transprop /tt efficiency 51 1  
  • 125. “Taking turns” MAC protocols channel partitioning MAC protocols: – share channel efficiently and fairly at high load – inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node! random access MAC protocols – efficient at low load: single node can fully utilize channel – high load: collision overhead “taking turns” protocols
  • 126. polling: • master node “invites” slave nodes to transmit in turn • typically used with “dumb” slave devices • concerns: – polling overhead – latency – single point of failure (master) master slaves poll data data “Taking turns” MAC protocols
  • 127. token passing:  control token passed from one node to next sequentially.  token message  concerns:  token overhead  latency  single point of failure (token) T data (nothing to send) T “Taking turns” MAC protocols
  • 128. MAC addresses and ARP • 32-bit IP address: – network-layer address for interface – used for layer 3 (network layer) forwarding • MAC (or LAN or physical or Ethernet) address: – function: used ‘locally” to get frame from one interface to another physically-connected interface (same network, in IP-addressing sense) – 48 bit MAC address (for most LANs) burned in NIC ROM, also sometimes software settable – e.g.: 1A-2F-BB-76-09-AD hexadecimal (base 16) notation (each “number” represents 4 bits)
  • 129. LAN addresses and ARP each adapter on LAN has unique LAN address adapter 1A-2F-BB-76-09-AD 58-23-D7-FA-20-B0 0C-C4-11-6F-E3-98 71-65-F7-2B-08-53 LAN (wired or wireless)
  • 130. LAN addresses (more) MAC address allocation administered by IEEE manufacturer buys portion of MAC address space (to assure uniqueness) analogy:  MAC address: like Social Security Number  IP address: like postal address  MAC flat address ➜ portability  can move LAN card from one LAN to another IP hierarchical address not portable
  • 131. ARP: address resolution protocol ARP table: each IP node (host, router) on LAN has table  IP/MAC address mappings for some LAN nodes: < IP address; MAC address; TTL>  TTL (Time To Live): time after which address mapping will be forgotten (typically 20 min) Question: how to determine interface’s MAC address, knowing its IP address? 1A-2F-BB-76-09-AD 58-23-D7-FA-20-B0 0C-C4-11-6F-E3-98 71-65-F7-2B-08-53 LAN 137.196.7.23 137.196.7.78 137.196.7.14 137.196.7.88
  • 132. ARP protocol: same LAN • A wants to send datagram to B – B’s MAC address not in A’s ARP table. • A broadcasts ARP query packet, containing B's IP address – dest MAC address = FF-FF- FF-FF-FF-FF – all nodes on LAN receive ARP query • B receives ARP packet, replies to A with its (B's) MAC address – frame sent to A’s MAC • A caches (saves) IP-to- MAC address pair in its ARP table until information becomes old (times out) – soft state: information that times out (goes away) unless refreshed • ARP is “plug-and-play”: – nodes create their ARP tables without intervention from net administrator
  • 133. walkthrough: send datagram from A to B via R – focus on addressing – at IP (datagram) and MAC layer (frame) – assume A knows B’s IP address – assume A knows IP address of first hop router, R (how?) – assume A knows R’s MAC address (how?) Addressing: routing to another LAN R 1A-23-F9-CD-06-9B 222.222.222.220 111.111.111.110 E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D 111.111.111.112 111.111.111.111 74-29-9C-E8-FF-55 A 222.222.222.222 49-BD-D2-C7-56-2A 222.222.222.221 88-B2-2F-54-1A-0F B
  • 134. R 1A-23-F9-CD-06-9B 222.222.222.220 111.111.111.110 E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D 111.111.111.112 111.111.111.111 74-29-9C-E8-FF-55 A 222.222.222.222 49-BD-D2-C7-56-2A 222.222.222.221 88-B2-2F-54-1A-0F B Addressing: routing to another LAN IP Eth Phy IP src: 111.111.111.111 IP dest: 222.222.222.222  A creates IP datagram with IP source A, destination B  A creates link-layer frame with R's MAC address as dest, frame contains A-to-B IP datagram MAC src: 74-29-9C-E8-FF-55 MAC dest: E6-E9-00-17-BB-4B
  • 135. R 1A-23-F9-CD-06-9B 222.222.222.220 111.111.111.110 E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D 111.111.111.112 111.111.111.111 74-29-9C-E8-FF-55 A 222.222.222.222 49-BD-D2-C7-56-2A 222.222.222.221 88-B2-2F-54-1A-0F B Addressing: routing to another LAN IP Eth Phy  frame sent from A to R IP Eth Phy  frame received at R, datagram removed, passed up to IP MAC src: 74-29-9C-E8-FF-55 MAC dest: E6-E9-00-17-BB-4B IP src: 111.111.111.111 IP dest: 222.222.222.222 IP src: 111.111.111.111 IP dest: 222.222.222.222
  • 136. R 1A-23-F9-CD-06-9B 222.222.222.220 111.111.111.110 E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D 111.111.111.112 111.111.111.111 74-29-9C-E8-FF-55 A 222.222.222.222 49-BD-D2-C7-56-2A 222.222.222.221 88-B2-2F-54-1A-0F B Addressing: routing to another LAN IP src: 111.111.111.111 IP dest: 222.222.222.222  R forwards datagram with IP source A, destination B  R creates link-layer frame with B's MAC address as dest, frame contains A-to-B IP datagram MAC src: 1A-23-F9-CD-06-9B MAC dest: 49-BD-D2-C7-56-2A IP Eth Phy IP Eth Phy
  • 137. R 1A-23-F9-CD-06-9B 222.222.222.220 111.111.111.110 E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D 111.111.111.112 111.111.111.111 74-29-9C-E8-FF-55 A 222.222.222.222 49-BD-D2-C7-56-2A 222.222.222.221 88-B2-2F-54-1A-0F B Addressing: routing to another LAN  R forwards datagram with IP source A, destination B  R creates link-layer frame with B's MAC address as dest, frame contains A-to-B IP datagram IP src: 111.111.111.111 IP dest: 222.222.222.222 MAC src: 1A-23-F9-CD-06-9B MAC dest: 49-BD-D2-C7-56-2A IP Eth Phy IP Eth Phy
  • 138. R 1A-23-F9-CD-06-9B 222.222.222.220 111.111.111.110 E6-E9-00-17-BB-4BCC-49-DE-D0-AB-7D 111.111.111.112 111.111.111.111 74-29-9C-E8-FF-55 A 222.222.222.222 49-BD-D2-C7-56-2A 222.222.222.221 88-B2-2F-54-1A-0F B Addressing: routing to another LAN  R forwards datagram with IP source A, destination B  R creates link-layer frame with B's MAC address as dest, frame contains A-to-B IP datagram IP src: 111.111.111.111 IP dest: 222.222.222.222 MAC src: 1A-23-F9-CD-06-9B MAC dest: 49-BD-D2-C7-56-2A IP Eth Phy
  • 139. Ethernet “dominant” wired LAN technology: • cheap $20 for NIC • first widely used LAN technology • simpler, cheaper than token LANs and ATM • kept up with speed race: 10 Mbps – 10 Gbps Metcalfe’s Ethernet sketch
  • 140. Ethernet: physical topology • bus: popular through mid 90s – all nodes in same collision domain (can collide with each other) • star: prevails today – active switch in center – each “spoke” runs a (separate) Ethernet protocol (nodes do not collide with each other) switch bus: coaxial cable star
  • 141. Ethernet frame structure sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame preamble: 7 bytes with pattern 10101010 followed by one byte with pattern 10101011  used to synchronize receiver, sender clock dest. address source address data (payload) CRCpreamble type
  • 142. Ethernet frame structure (more) addresses: 6 byte source, destination MAC addresses  if adapter receives frame with matching destination address, or with broadcast address (e.g. ARP packet), it passes data in frame to network layer protocol  otherwise, adapter discards frame type: indicates higher layer protocol (mostly IP but others possible, e.g., Novell IPX, AppleTalk) CRC: cyclic redundancy check at receiver  error detected: frame is dropped dest. address source address data (payload) CRCpreamble type
  • 143. Ethernet: unreliable, connectionless • connectionless: no handshaking between sending and receiving NICs • unreliable: receiving NIC doesnt send acks or nacks to sending NIC – data in dropped frames recovered only if initial sender uses higher layer rdt (e.g., TCP), otherwise dropped data lost
  • 144. Switch: multiple simultaneous transmissions • hosts have dedicated, direct connection to switch • switches buffer packets • Ethernet protocol used on each incoming link, but no collisions; full duplex – each link is its own collision domain • switching: A-to-A’ and B-to-B’ can transmit simultaneously, without collisions switch with six interfaces (1,2,3,4,5,6) A A’ B B’ C C’ 1 2 345 6
  • 145. Switch forwarding table Q: how does switch know A’ reachable via interface 4, B’ reachable via interface 5? switch with six interfaces (1,2,3,4,5,6) A A’ B B’ C C’ 1 2 345 6 A: each switch has a switch table, each entry:  (MAC address of host, interface to reach host, time stamp)  looks like a routing table! Q: how are entries created, maintained in switch table?  something like a routing protocol?
  • 146. A A’ B B’ C C’ 1 2 345 6 Switch: self-learning • switch learns which hosts can be reached through which interfaces – when frame received, switch “learns” location of sender: incoming LAN segment – records sender/location pair in switch table A A’ Source: A Dest: A’ MAC addr interface TTL Switch table (initially empty) A 1 60
  • 147. A A’ B B’ C C’ 1 2 345 6 Self-learning, forwarding: example A A’ Source: A Dest: A’ MAC addr interface TTL switch table (initially empty) A 1 60 A A’A A’A A’A A’A A’ • frame destination, A’, locaton unknown:flood A’ A  destination A location known: A’ 4 60 selectively send on just one link
  • 148. Interconnecting switches switches can be connected together Q: sending from A to G - how does S1 know to forward frame destined to F via S4 and S3?  A: self learning! (works exactly the same as in single-switch case!) A B S1 C D E F S2 S4 S3 H I G
  • 149. Self-learning multi-switch example Suppose C sends frame to I, I responds to C  Q: show switch tables and packet forwarding in S1, S2, S3, S4 A B S1 C D E F S2 S4 S3 H I G
  • 150. Switches vs. routers both are store-and-forward:  routers: network-layer devices (examine network- layer headers)  switches: link-layer devices (examine link-layer headers) both have forwarding tables:  routers: compute tables using routing algorithms, IP addresses  switches: learn forwarding table using flooding, learning, MAC addresses application transport network link physical network link physical link physical switch datagram application transport network link physical frame frame frame datagram
  • 151. VLANs: motivation consider:  CS user moves office to EE, but wants connect to CS switch?  single broadcast domain:  all layer-2 broadcast traffic (ARP, DHCP, unknown location of destination MAC address) must cross entire LAN  security/privacy, Computer Science Electrical Engineering Computer Engineering
  • 152. VLANs port-based VLAN: switch ports grouped (by switch management software) so that single physical switch …… switch(es) supporting VLAN capabilities can be configured to define multiple virtual LANS over single physical LAN infrastructure. Virtual Local Area Network 1 8 9 16102 7 … Electrical Engineering (VLAN ports 1-8) Computer Science (VLAN ports 9-15) 15 … Electrical Engineering (VLAN ports 1-8) … 1 82 7 9 1610 15 … Computer Science (VLAN ports 9-16) … operates as multiple virtual switches
  • 153. Port-based VLAN 1 8 9 16102 7 … Electrical Engineering (VLAN ports 1-8) Computer Science (VLAN ports 9-15) 15 …  traffic isolation: frames to/from ports 1-8 can only reach ports 1-8  can also define VLAN based on MAC addresses of endpoints, rather than switch port  dynamic membership: ports can be dynamically assigned among VLANs router  forwarding between VLANS: done via routing (just as with separate switches)  in practice vendors sell combined switches plus routers