The Medium Access Sub Layer: Aloha
The Medium Access Sub Layer: Aloha
The Medium Access Sub Layer: Aloha
Broadcast channels [or multi-access channels] are a category of networks and the key
issue is how to determine who gets to use the channel when there is competition for it. The
protocols which define these factors belong to a sub layer of data link layer called the
MAC(medium access control)sub layer.
ALOHA: Norman Abramson devised a new and elegant method to solve the channel
allocation problem called the “ALOHA” system which used ground-based Radio broad casting.
Two categories are present in this ALOHA system. They are:
a. Requires global time synchronization [SLOTTED ALOHA]
b. Doesn’t require global time synchronization. [PURE ALOHA]
(a). SLOTTED ALOHA: Roberts published a method for doubling the capacity of an ALOHA
system by dividing the time up into discrete intervals, with each interval corresponding to a
single frame. Time synchronization was achieved by having a special station that emits a pip at
the start of each interval, like a clock. In this system, a computer is not permitted to send
whenever a carriage return is typed. Instead, it is required to wait for the beginning of next slot.
Since the vulnerability period is now halved, the probability of no other traffic during the some
slot is e-g leads to…………….
S = Ge-g
From the graph, SLOTTED ALOHA peaks at G=1 with a throughput of about 0.368.
If system is operating at G=1, Probability of empty slot is 0.368 i.e. 36% of channel is
utilized. at higher values of G……
Operating
1
NIET, GUNTUR Medium Access Sub Layer
(b).PURE ALOHA: In an ALOHA system, users transmit whenever they have data to be sent
in fixed length frames. when collision occur, the sender gets the information due to the feedback
property of broadcasting. If the frame was destroyed, the sender just waits a random amount of
time and sends it again.
User
If the first bit of a new frame overlaps with just the last bit of a frame almost finished,
both frames will be totally destroyed and both will have to be re-transmitted later.
FRAME TIME: the amount of time needed to transmit the standard, fixed length frame
Let the mean frame (new) generated by different number of users per frame time be ‘s’(frames
without collisions). The value of S can be therefore, either 0 or 1.
0<=S<=1
2
NIET, GUNTUR Medium Access Sub Layer
(1)
Let the mean frames (new + retransmitted)generated by different no of users per frame time
without collisions be ‘G’. The value of G is obviously greater than of equal to S
G>=S (2)
G>S (4)
S=GP0 (5)
~=
If Pr[k] is the probability that ‘k’ frames are generated during a given frame time, then
Pr[k] = Gk e-G (6)
K!
P0 = e-G ( 7)
The mean no. of frames generated in an interval of 2 frame times long is given by ‘2G’.
The probability of no other traffic being initiated during the entire vulnerable period is given by
P = e-2G (8)
The maximum throughput occurs at G=0.5 with S=1/2e i.e., S=0.184 i.e.,
Def:- Protocols in which stations listen for a carrier (i.e. transmission) and act
accordingly are called Carrier Sense Protocols.
3
NIET, GUNTUR Medium Access Sub Layer
(1)1-Persistant CSMA: When a station has data to send, it first listens to the channel to see if
anyone else is transmitting at that moment. If the channel is busy, the station waits until it
becomes idle. When the station detects an idle channel, it transmits a frame. If a collision occurs,
the station waits a random amount of time and starts all over again. The protocol is called
1-persistant because the station transmits with a probability of 1 whenever it finds channel idle.
Problems:-
1. If a station becomes ready to send (just after another station begins sending),if senses the
channel to be idle(because of propagation delay of the first)and will begin sending, which
results in a collision.
2. If 2 stations become ready in the middle of third stations transmission, both will politely
wait until the transmission ends and both will begin transmitting exactly simultaneously,
resulting in a collision.
2.Non-persistent CSMA:- A station senses the channel before sending. IF no one else is
sending, the station begins doing so itself. If the channel is already in use, the station does not
continually sense it for the purpose of seizing it immediately upon detecting the end of the
previous transmission. Instead it waits a random period of time and then repeats the algorithm.
3.p-Persistent CSMA:- It applies to slotted channels. When a station becomes ready to send, if
senses the channel. If it is idle, it transmits with a probability ‘P’ with a probability q=1-p it
differs until the next slot. If that slot is also idle, it either transmits or defers again, with
4
NIET, GUNTUR Medium Access Sub Layer
probabilities p and q. This process is repeated until either the frame has been transmitted or
another station has began transmitting. If the station initially senses the channel busy, it waits
until the next slot and applies the above algorithm.
to
Time
At the point marked ‘to’, a station has finished transmitting its frame. Any other station
having a frame to send may now attempt to do so. As actual transmissions and retransmissions
(if any collision occurs)occur, our model for CSMA/CD will consist of alternating transmission
and contention periods, with idle periods occurring when all stations are quit.
5
NIET, GUNTUR Medium Access Sub Layer
If 2 stations begin transmitting both exactly at time ‘to’, they realize that there has been a
collision by determining the length of contention period and thus the delay and throughput.
The minimum time to detect this collision is the time taken by the signal to propagate
from one station to the other.
Several standards produced by IEEE which include CSMA/CD token bus and token ring are
collectively known as IEEE 802.
802.1 standard gives an introduction to the set of standards and defines I/f primitives.
802.2 standard gives the upper part of data link layer which uses LLC protocol.
802.3 standard describes the LAN standard….CSMA/CD
802.4 standard describes the LAN standard… Token bus.
802.5 standard describes the LAN standard…Token ring.
IEEE 802.3: The 2.94mbps CSMA/CD system built by Xerox PARC connects over 100
personal stations on a 1 k.m cable called “Ethernet”, in which the system uses ALOHA along
with carrier sensing technique. Later, Xerox, DEC and INTEL drew up a standard for a 10-mbps
Ethernet, called the 802.3,which describes a whole family of 1-PERSISTENT CSMA/CD
systems running at speeds from 1 to 10mbps on various media.
6
NIET, GUNTUR Medium Access Sub Layer
Transceiver: It is clamped securely around the cable so that its tap makes contact with the inner
core. It contains the electronics that handle carrier detection and collision detection. When a
collision is detected, it puts a special invalid signal on the cable to ensure that also puts a special
invalid signal, on the cable to ensure that all other transceivers also realize that a collision has
occurred.
Transceiver Cable: It connects the transceiver to an I/f board in the computer. It may be upto
50mts long and contains 5 individually shielded twisted pairs:
2 pairs for data in & data out.
2 pairs for control signals in & out.
1 pair to power transceiver electronics.
I/F board: It contains a controller chip that transmits frames to, receives frames from
transceiver.
Controller: It is responsible for assembling the data into proper frame format , as well as
computing checksums on outgoing frames and verifying them on incoming frames.
Note: The length of the n/w can be extended by the use of repeaters between any 2 stations.
This standard allows a maximum of 4 repeaters in the path between any 2 stations, extending
the effective length of the medium to 2.5km.
2) 10 base-2: This is popularly called “Thin Ethernet”. Connections to it are made using
industry standard BNC connectors to form T-junctions. It runs for only 200mts and can handle
30 machines per cable segment. It is much cheaper and easier to install. The connection to the
cable is just a passive BNC T-junction connector. The transceiver electronics are on the
controller board and each station always has its own transceiver.
7
NIET, GUNTUR Medium Access Sub Layer
Time Domain Reflectometry: To detect cable breaks, bad taps or loose connectors, a pulse
of known shape is injected into the cable, by which an echo will be generated and sent back,
If it hits an obstacle or end of cable. By carefully timing the interval between sending the
pulse and receiving the echo , origin of echo can be localized.
3) 10 base-T: This defines a star-shaped topology in which all stations have a cable running to a
central hub. Usually these wires are telephone company twisted pairs. In this, the hub acts as the
repeater in which it repeats the signal on the outgoing line to each station, when a single station
transmits.
Advantages:
8
NIET, GUNTUR Medium Access Sub Layer
Disadvantages:
4) 10 base-F: This uses Fiber optics, which has excellent noise immunity and it is the choice of
method when running between buildings r widely separated hubs.
As more and more stations are added to 802.3 LAN, the traffic will go up and eventually,
the LAN will saturate. The solution is to go to higher speed, say from 10mbps to 100mbps,
which is achieved through a switched 802.3 LAN.
The heart of this system is a switch containing a high-speed backplane and room for typically
4 to 32 plug-in line cards, each containing 1 to 98 connectors. Most often, each connector has a
10 base-T twisted pair connection to a single host computer.
When a station wants to transmit 802.3 frames, it computes a standard frame to the switch
the plug-in card getting the frame checks to see if it is destined for one of the other stations
9
NIET, GUNTUR Medium Access Sub Layer
connected to the same card. If so, the frame is copied there. If not, the frame is sent over the
high-speed back plane typically runs at over 1 gap using a proprietary protocol.
Problem: Do 2 machines attached to the same plug-in card transmit frame at same time?
Solution1: Form a local onward LAN with all the plots on the card, wiring together. So,
collisions will be detected and handled as in an CSMA/CD n/w, with
retransmission using back off algorithm.
Solution2: Each I/P port is back off algorithm so incoming frames are stored in the cards on-
board RAM as they arrive. Once a frame has been completely received, the card
can then check to see if the frame is destined post, and transmit accordingly. As
each port is a separate collision domain, no collisions occur.
Physically Token bus is a linear or Tree-shaped cable onto which the stations are attached.
Logically the stations are praised into a “ring” with each station knowing the address of the
station to its “left” and “right”. When the logical ring is initialized, the highest numbered station
may send the first frame. After it is done, it passes permission to its immediate neighbor by
sending the neighbor a special control frame called a “token” which propagates around the
logical ring, with only the token holder being permitted to transmit frames. Since only one
station at a time holds the token, collisions do not occur. The token bus uses 75-Ω broadband
coaxial cable for physical layer which permits 3 different analog modulation schemes:
1. Phase continuous Frequency Shift Keying.
2. Phase coherent Frequency Shift Keying
3. Multilevel duo binary amplitude modulated Phase Shift Keying.
10
NIET, GUNTUR Medium Access Sub Layer
When the ring is initialized stations are inserted into it in order of station address, from
highest to lowest. Token passing is also done from high to low addresses. Each time a station
acquires the token; it can transmit frames for a certain amount of time and then, it passes the
token on. If a station has no data, it passes the token immediately upper receiving it.
The token bus defines 4 priority classes 0, 2, 4and 6 for traffic, with 0 the lowest and 6
the highest. When the token comes into the station over the cable, it is passed initially to the
priority 6 substation, which may begin transmitting frames, if it has any. When it is done, the
token is passed internally to priority 4 substation which may then transmit frames until its timer
expires at which point the token is passed internally to priority 2 substation. This process is
repeated until either the priority 0 substation has sent all of its frames or its timer has expired. At
this point , the token is sent to the next station in the ring.
Addition of new station into the Ring: Once the ring has been established, each station’s
interface maintains the address of the predecessor and successor stations internally. Periodically,
the token holder sends of the SOLICIT-SUCCESSOR frames to solicit bids from stations that
wish to join the ring. The frame gives the sender’s address and the successor’s address. Stations
inside that range may bid to enter. If no station bids to enter with in a slot time, the response-
window is closed and the token holder continues with its normal business. If exactly one station
bids to enter, it is inserted into the ring and becomes the token holder’s successor. If 2 or more
stations bid to enter, their frames will collide and be garbled. The token holder then runs an
arbitration algorithm, starting with the broadcast of a RESOLVE-CONTENTION frame. Each
station has a timer that is reset whenever it acquires the token.
Leaving of a station from the ring: A station ‘X’ with successor ‘S’ and predecessor ‘P’
leaves the ring, by sending ‘P’ a SET-SUCCESSOR frame telling it that henceforth its
successors is ‘S’ instead of ‘X’. Then ‘X’ just transmitting.
Initialization of a Ring:
11
NIET, GUNTUR Medium Access Sub Layer
o It is a special case of adding new stations. As soon as the system is powered ON and if it
notices that there is no traffic for a certain period, it sends a CLAM - TOKEN Frame.
o It creates a token and sets up a ring containing only itself.
o Periodicity, it solicits bids for new stations to join.
o As new stations are ON, they will respond to these bids and join bid using contention alg.
2. If a station fails to pass the token to its successor and also fails to locate the
successor and also fails to locate the successor’s successor, which may also be down.
Sol: The system sends a SOLICIT–SUCCESSOR–2 frame to see if anyone else is still
alien. Once again the standard contention protocol is run, with all stations that want to be in
the ring now bidding for a place. Eventually the ring is reestablished
3. If the token holder goes down and takes the token with it.
Sol: This is solved using Ring Initialization algorithm. Each station issues a hits a threshold
value, the station issues a CLAIM–TOKEN frame and contention algorithm determines who
gets the token.
4. Multiple Tokens………
Sol:
12
NIET, GUNTUR Medium Access Sub Layer
If there were more than 2, this process would be repeated sooner or later until all
but one were discards.
If by accident, all tokens are discarded, then lack of activity will cause one or
more stations to try to claim token.
A token ring consists of a collection of ring interfaces connected by point-to-point lines. Each bit
arriving at an interface is copied into a 1-bit buffer and then copied out on to the ring again.
While in the buffer, the bit can be inspected and possibly modified before being written out. This
copying bit introduces a 1-bit delay at each interface.
13
NIET, GUNTUR Medium Access Sub Layer
In a token ring, a special bit pattern called the “token”, circulates around the ring when
ever all stations are idle. When a station wants to transmit a frame, it is required to seize the
token by inverting a single bit in 3-byte token.
Logically it is a ring but physically, each station is connected to the wire center by a
cable containing 2 twisted pairs (at least) one for data to the station and one for data from the
station. Inside the wire center are bypass relays that are energized by current from the stations.
The ring breaks or a station goes down, loss of drive current will releases the relay and bypass
the station. The ring can then continue operation with the bad segment bypassed
When there is no traffic or the ring, a 3-bits token circulates endlessly waiting for a
station to size it by setting a specific ‘0’ bit to a ‘1’ bit, thus converting the token into the start-
of-frame sequence. The station then outputs the rest of a normal data frame.
1 1 1 2 or 6 2 or6 no limit 4 1 1
SD AC FC Destination address Source address DATA Check Sum ED FS
14
NIET, GUNTUR Medium Access Sub Layer
Ring Maintenance: The token ring protocol handles maintenance by the presence of “monitor
station” that the overseas ring. When the ring comes up or any station notices that these is no
monitor, it can transmit a CLAIM TOKEN control frame navigates the ring before any other
CLAIM TOKEN frames are sent, the sender becomes the new monitor.
Monitor’s Responsibilities:
15
NIET, GUNTUR Medium Access Sub Layer
1. To check for lost token: The monitor has a timer that is set to the longest possible token less
Interval. each station transmitting for the full token-holding time. If this timer goes off, the monitor
drains the ring and issues a new token.
2. When a garbled frame appears: The monitor can detect it by its invalid format or checksum,
open the ring to drain it, and issue a new token when the ring has been cleaned up.
3. When orphan frame is detected: An orphan frame is detected by setting the monitor bit in
Access Control byte whenever it passes through. If an incoming frame has this bit set,
something is wrong since the same frame has passed the monitor twice without having been
drained, so the monitor drains it.
4. When the Ring breaks: A station transmits a BEACON frame, [if it notices that either of its
neighbors appears to be dead] giving the address of presumably dead station, by which it can
know the no of stations down and delete them from the ring using the bypass relays in the wire
center.
Bytes 1 1 1
SD AC ED
Staring Delimiter
Access Control
Ending Delimiter
A token ring consists of a collection of ring interfaces connected by point-to-point lines. Each
bit arriving at an interface is copied into a 1-bit buffer and then copied out on to the ring again.
While in the buffer, the bit can be inspected and possibly modified before being written out.
This copying bit introduces a 1-bit delay at each interface. In a token ring, a special bit pattern
called the “token”, circulates around the ring when ever all stations are idle. When a station
wants to transmit a frame, it is required to seize the token by inverting a single bit in 3-byte
token. Because there is only one token, only one station can transmit at a given instant, thus
solving the channel access problem. The token ring must itself have sufficient delay which has 2
components:
16
NIET, GUNTUR Medium Access Sub Layer
Problem with a ring network: If the cable breaks somewhere, the ring dies.
Solution: “WIRE CENTER”.
BRIDGES
Def: The devices by which multiple LANs can be connected are called BRIDGES and
these devices operate in Data Link Layer.
17
NIET, GUNTUR Medium Access Sub Layer
2. Delay at low local is zero. 2.Substantial delay at low 2. Substantial delay at low load.
Load.
3. Substantial analog component. 3. No analog component. 3. No analog component.
4. Priorities are not possible. 4. Priorities can be assigned. 4. Priorities can be assigned.
5. As the speed increases the 5. As the speed increases the 5. As the speed increases the
Efficiency decreases. Efficiency increases. Efficiency increases.
6. At high load, the presence of 6. At high load, it has excellent 6. At high load, it has excellent
collision seriously affect the Throughput & efficiency. Throughput & efficiency.
Throughput.
7. It uses a passive cable. 7. It uses highly reliable cable 7. Rings one built using virtually
Television equipment. any transmission medium from
Carrier pigeon to fiber optics.
Standard twisted pair is cheap.
1. Many universities and corporate departments have their own LANs in which goals of various
departments differ. Bridges are needed when there is need for interaction between these
various departments.
2. The organization may be geographically spread over several buildings separated by
considerable distances. It may be cheaper to have separate LANs in each building and connect
them with bridges rather than to run a single coaxial cable over the entire site.
3. It may be necessary to split what is logically a single LAN into separate LANs to
accommodate the load.
4. In some situations, a single LAN would be adequate in terms of the load, but the physical
18
NIET, GUNTUR Medium Access Sub Layer
distance between distant machines is too great.(Eg: >2.5 kms for 802.3). Even if laying the
cable is easy to do, the network would not work due to the excessively long round-trip delay.
The only solution is to partition the LAN and install bridges between the segments.
5. Bridges can contribute to organization’s security. Most LAN interfaces have a promiscuous
mode, in which all frames are given to the computer, not just those addressed to it. By
inserting bridges at various places and being careful not to forward sensitive traffic, it is
possible to isolate parts of the network so that it’s traffic cannot escape and fall into wrong
hands.
6. There is no matter of reliability . On a single LAN, a defective node that keeps outputting a
continuous stream of garbage will cripple the LAN. Bridges can be inserted at critical places
to prevent a single node which has gone berserk from bringing down the entire system.
Problems:
1. Each of the LANs uses a different frame format. Any copying between different LANs
require reformatting, which takes CPU time, requires a new checksum calculation and
introduces the possibility of undetected errors due to bad bits in the bridge’s memory.
2. Interconnected LANs do not necessarily run at the same data rate. When forwarding a
long run of back-to-back frames from a fast LAN to a slower one, the bridge will not be
able to get rid of the frames as fast as they come in. It’ll have to buffer them, hoping not to
run out of memory.
3. The value of timers in higher layers is a bottleneck problem in bridges. Suppose that the
n/w layer in an 802.4 LAN is trying to send a very long message as a sequence of frames.
After sending the last one, it starts its timer to wait for an acknowledgement. If the
message has to transmit a bridge to a slower 802.5 LAN, there is a danger that the timer
will go off before the last frame has been forwarded onto the slower LAN. The n/w layer
will assume that the problem is due to a lost frame and just retransmits the entire sequence
again. After ‘n’ failed attempts, it may give-up and tell the transport layer that the
destination is dead.
4. All the three LANs have a different maximum frame length. For 802.3,802.4,802.5
standards, the payload is 1500, 8191 and 5000 bytes respectively.
19
NIET, GUNTUR Medium Access Sub Layer
5. An obvious problem is when a long frame must be forwarded onto a LAN that cannot
accept it, which has no solution. Frames that are too large to be forwarded must be
discarded.
802.3 802.3 : The only thing that can go wrong is that the destination LAN is so
heavily loaded that frames keep pouring into the bridge, but the
bridge cannot get rid of them. If this situation persists long enough,
the bridge might run out of buffer space and begin dropping frames.
802.3 802.4 : We have the problem of what to put in the priority bits.
802.4 802.3 : (a). 802.4 frames carry priority bits that 802.3 frames do not have.
(b). Temporary token handoff feature of 802.4
802.4 802.4 : The only problem is what to do with the temporary token handoff.
802.4 802.5 : (a). Potential problem with frames that are too long.
(b). Temporary token handoff problem.
802.5 802.3 : The 802.5 frame format has A and C bits in the frame status byte.
These bits are set by the destination to tell the sender whether the
station addressed saw the frame and whether it copied it. Here, a
bridge can lie and say the frame has been copied, but if it later
turns out that the destination is down, serious problems may arise.
802.5 802.4 : (a). Definition of priority bits is different for the 2 LANs
(b). The A and C bits of frame status byte in 802.5
802.5 802.5 : What to do with A and C bits is the major problem.
20
NIET, GUNTUR Medium Access Sub Layer
4. Remote Bridges.
1. Transparent Bridges:
This is the first 802 bridge, which operates in promiscuous mode accepting every frame
transmitted on all LANs to which it is attached.
Eg : A configuration with 4 LANs and 2 Bridges:
A frame arriving at bridge B 1 on LAN1 destined for ‘A’ can be discarded immediately,
because it is already on the right LAN, but a frame arriving on LAN1 for ‘C’ and ‘F’ must be
forwarded. When a frame arrives, a bridge must decide whether to discard or forward it, and if
the latter , on which the LAN to put the frame. This decision is made by looking up the
destination address in a big (hash) table inside the bridge. The table can list each possible
destination and tell which output line (LAN) it belongs on. When the bridges are first plugged in,
all the hash tables are empty. None of the bridges know where any of the destinations are, so
they use flooding algorithm.
Flooding Algorithm:
Every incoming frame for an unknown destination is output on all the LANs to which the bridge
is connected except the one it arrived on. As time goes on, the bridges learn where destinations
are. Once a destination is known, frames destined for it are put on only the proper LAN and are
not flooded.
21
NIET, GUNTUR Medium Access Sub Layer
The bridges operate in promiscuous mode and they see every frame sent on any of their
LANs. By looking at the source address, they can tell which machine is accessible on
which LAN.
Eg: In the above figure, If bridge ‘B1’ sees a frame on LAN2 coming from C, it knows
that ‘C ’ must be reachable LAN2, so it makes an entry in its hash table noting that
frames going to ‘C’ should use LAN2. Any subsequent frame addressed to ‘C’ coming on
LAN1 will be forward, but a frame for ‘C’ coming on LAN2 will be discarded.
The topology can change as machines and bridges are powered up and down and moved
around. To handle dynamic topologies, whenever a hash table entry is made, the arrival
time of the frame is noted in the entry. Whenever a frame whose destination is already in
the table arrives, its entry is updated with the current time. Thus, the time associated with
every entry tells the last time a frame from that machine was seen.
Periodically, a process in the bridge scans the hash table and purges all entries more than
a few minutes old. In this way, if a computer is unplugged from its LAN, moved around
the building and re-plugged in some where else, within a few minutes, it will be back in
normal operation, without any manual intervention.
Routing: The Routing procedure for an incoming frame depends on the LAN it arrives on
(the source LAN) and the LAN its destination is on (the Destination LAN), as follows:
1) If the destination and source LANS are the same, discard the frame.
2) If the destination and source LANS are different, forward the frame.
3) If the destination LAN is unknown, use flooding.
As each frame arrives, this algorithm must be applied.
22
NIET, GUNTUR Medium Access Sub Layer
The unknown Destination is handled using flooding i.e., copies it to LAN2 in the above
example. Shortly there after, bridge1 sees F2, a frame with an unknown destination, which it
copies to LAN1, generating F3. Similarly, bridge2 copies F1 to LAN1 generating F4 .Bridge1 now
forwards F4 and bridge2 copies F3. This cycle goes on forever.
In the above example, 9 LANS are interconnected by 10 bridges. This configuration can be
abstracted into a graph with the LANS as the nodes. An arc connects any 2 LANS that are
connected by a bridge. The graph can be reduced to a spanning tree by dropping the arcs shown
as dotted lines.
A spanning tree covering the LANS :
23
NIET, GUNTUR Medium Access Sub Layer
Using this spanning tree, there is exactly one path from every LAN to every other
LAN .Once the bridges have agreed on the spanning tree , all forwarding between LANS
follows the spanning tree. Since there is a unique path from each source to each destination,
loops are impossible.
This scheme is employed by token ring people where as Transparent bridges are
employed by Token Bus & CSMA/CD. The Source Routing assumes that the sender of each
frame knows whether or not the destination is on its own LAN. When sending a frame to a
different LAN, the source machine gets high - order bit of the source address to 1, to mark it.
Further more, it includes in the Frame header the exact path that the frame will follow.
This path can be constructed as follows:--
1. Each LAN has a unique 12-bit number and each bridge has a 4-bit number that uniquely
identifies it in the context of its LANS. A route is then a sequence of bridge, LAN,
bridge, LAN,…numbers.
2. A source routing bridge is only interested in those frames with high-order bit of
destination set to ‘1’.
3. For each such frame that it sees, it scans the route looking for the number of the LAN on
which the frame arrived.
24
NIET, GUNTUR Medium Access Sub Layer
4. If this LAN number is followed by its own bridge number, the bridge forwards the frame
onto the LAN whose number follows its bridge number in the route.
5. If the number of some other bridge follows the incoming LAN number, it does not
forward the frame.
In source Routing, every machine in the internet, knows or can find, the best path to
every other machine. These routers are discovered from the basic idea that If a destination is
unknown, the source issues a broadcast frame asking where it is. The DISCOVERY FRAME is
forwarded by every bridge so that it reaches every LAN or the inter network. When the reply
comes back, the bridges record their identity in it, so that the original sender can see the exact
route taken and ultimately choose the best route.
25
NIET, GUNTUR Medium Access Sub Layer
1. Each discovery frame sent by station 1 is copied by each of the 3 bridges on LAN1,
yielding 3 discovery frames on LAN2.
2. Each of these is copied by each of the bridges on LAN2, resulting in 9 frames
on LAN3.
3. By the time we reach LAN N, 3N-1 frames are circulating.
4. If a dozen sets of bridges are traversed , more than a million discovery frames will
have to be injected into the last LAN, causing severe congestion.
Used to connect 2 or more distant LANS. For example , a company might have plants in several
cities, each with its own LAN. Ideally ,all the LAND should be interconnected so the complete
system acts like one large LAN. This goal can be achieved by putting a bridges on each LAN
and connecting the bridges pair wise with point-to-point lines.
26
NIET, GUNTUR Medium Access Sub Layer
The 3 point-to-point lines are regarded as host less LANS . Then we have a normal system of 6
LANS interconnected by 4 Bridges.
27