Unit II Media Access Control Ethernet: Presentation By: Kaythry P. Assistant Professor, ECE SSN College of Engineering

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 47

Unit II

MEDIA ACCESS CONTROL


ETHERNET
Presentation by:
KAYTHRY P.
Assistant Professor, ECE
SSN College of Engineering
Objectives
 At end of this session, learners able to answer,
 Why CSMA/CD is required?
 What is meant by Ethernet?
Introduction
• The data link layer is further classified in to 2
sub layers
• Logical Link Control sub layer (LLC)
• Media Access Control Sub layer (MAC)
• The computer society of IEEE started a project
called 802 to set the standards to enable
intercommunication among various devices.
OSI Model and IEEE Standard
Ethernet
• Multiple access networks – set of nodes send and
receives frames over a shared network.(Bus)
• Uses ALOHA (packet radio network) as the root
protocol
– Developed at the University of Hawaii to support
communication across the Hawaiian Islands.
– For ALOHA the medium was atmosphere, for Ethernet
the medium is a coax cable.
– An algorithm to control when a node can transmit
– Most of the Ethernet are point to point & interconnect
switches (multiple access techniques are not used much
now-a-days)
Ethernet – IEEE 802.3
Ethernet Cable and Port
Ethernet – Over view
•The topics that are to be discussed in the
upcoming sessions are as follows:
• Evolution
• Physical properties
• Frame format
• Addressing
• Transmitter algorithm
Ethernet - Evolution
• Ethernet is an dominant Local Area Networking
Technology developed in the year 1976 at Xerox’s
Palo Alto Research Centre (PARC)
Ethernet
• DEC and Intel joined Xerox to define a 10-
Mbps Ethernet standard in 1978.
• This standard formed the basis for IEEE
standard 802.3
• More recently 802.3 has been extended to
include a 100-Mbps version called Fast
Ethernet and a 1000-Mbps version called
Gigabit Ethernet.
Ethernet – Evolution – Why?
Evolutions of Ethernet
• It has gone through 4 generations
• Standard Ethernet – 10Mbps
• Fast Ethernet – 100mbps
• Gigabit Ethernet – 1Gbps
• Ten Giga bit Ethernet – 10Gbps
Ethernet – Physical properties
• An Ethernet segment is implemented on a coaxial
cable of up to 500 m.
– This cable is similar to the type used for cable TV except that it
typically has an impedance of 50 ohms instead of cable TV’s 75
ohms.
• Hosts connect to an Ethernet segment by tapping
into it.
• A transceiver (a small device directly attached to
the tap) detects when the line is idle and drives
signal when the host is transmitting.
• The transceiver also receives incoming signal.
• The transceiver is connected to an Ethernet adaptor
which is plugged into the host.
Ethernet

Ethernet transceiver and adaptor


Ethernet
• Multiple Ethernet segments can be joined
together by repeaters.
• A repeater is a device that forwards
digital signals and understand only bits
not frames.
• Multiway repeaters can also be used –
Hub
• No more than four repeaters may be
positioned between any pair of hosts.
– An Ethernet has a total reach of only 2500
Ethernet

Ethernet Hub
Ethernet

Ethernet repeater
Ethernet
• Any signal placed on the Ethernet by a
host is broadcast over the entire network
– Signal is propagated in both directions.
– Repeaters forward the signal on all outgoing
segments.
– Terminators attached to the end of each segment
absorb the signal.
• Ethernet uses Manchester encoding
scheme.
• Collision Domain – dealing with competition
for the link
Ethernet
• New Technologies in Ethernet
– Instead of using coax cable, an Ethernet can
be constructed from a thinner cable known
as 10Base2 (the original was 10Base5)
• 10 means the network operates at 10 Mbps
• Base means the cable is used in a baseband
system
• 2 means that a given segment can be no longer
than 200 m
Ethernet

• New Technologies in Ethernet


– Another cable technology is 10BaseT
• T stands for twisted pair
• Limited to 100 m in length
– With 10BaseT, the common configuration is
to have several point to point segments
coming out of a multiway repeater, called
Hub
Ethernet – frame format
• The algorithm is commonly called Ethernet’s
Media Access Control (MAC).
– It is implemented in Hardware on the network
adaptor.
• Frame format
– Preamble (64bit): allows the receiver to synchronize
with the signal (sequence of alternating 0s and 1s).
– Host and Destination Address (48bit each).
– Packet type (16bit): acts as demux key to identify the
higher level protocol.
Ethernet Frame
Data (up to 1500 bytes)
Minimally a frame must contain at least 46
bytes of data.
Frame must be long enough to detect
collision.
CRC (32bit)

Ethernet Frame Format


Cyclic Redundancy Check :
PREAMBLE:
Source Address (SA):
SFD
Data (Start
& Frame
Padding: Delimiter):
Length or Type:
• This field contains Error Detection Information.
• 7Destination
•• •BYTES ofcontaining
6 Address
It issegment
This bytes.
is 1
alternate
(DA):
byte long.
0’s and 1’s
It
• canUsedbe for
a minimum
2 purposesize from 46 bytes to maximum of 1500
• This alerts
of the receiving system about theSource
incominghostframe and
• • This
It isindicates
Contains
bytes. 6 bytes.
the physical
the start ofaddress of the
the frame. or stations.
• Ethernet (Type) – To define the upper layer protocol.
helps
• in synchronization
• TheItContains
carries the physical
last 2 data
bits (11) alertsaddress
encapsulatedthe fromof the
thethat
receiver destination
the layer
upper host is
next field or
• This• IEEE (Length) – To specify the number of bytes in the data field.
is added at physical layer. Not a part of frame.
stations.
destination address.
Ethernet Addresses
• Each host on Ethernet has unique
Ethernet address (belong to adopter not
the host) – burned into ROM.
• To ensure that every adaptor gets a
unique address, each manufacturer of
Ethernet devices is allocated a different
prefix that must be prepended to the
address on every adaptor they build
• AMD (advanced micro devices) has been
assigned the 24bit prefix 8:0:20 or
x080020
Addressing

• Each station on the


network has its own
Network Interface
Card (NIC).
• This NIC Provides the
6 Byte Physical
Address.
Addressing
• If your computer has both an Ethernet
interface and a Wireless interface, each will
have its own unique hardware address.
• An Ethernet or Wireless hardware address is a
6-byte hexadecimal number; for example:
080007A9B2FC. Each byte is written as two
hexadecimal digits, so there are twelve
hexadecimal digits; each hex digit is a number
from 0-9 or a letter from A-F. The letters A-F
may be uppercase or lowercase.
Addressing
• Sometimes an '0x' is written before the value
to make explicit that the following value
should interpreted as hexadecimal. This '0x' is
not part of the value.
• Ethernet and Wireless hardware addresses are
often written in other forms, to make them
easier to understand. It is common separate the
six pairs of hexadecimal digits (the A-F are
considered hexadecimal digits, rather than
letters) with colons or dashes, like:
08:00:07:A9:B2:FC or 00-00-94-ba-0e-cc.
• When using colons or dashes to separate the
address into six pairs, sometimes any leading
zero in each pair of digits is dropped; e.g.
8:0:7:A9:B2:FC or 0:0:94:ba:e:cc. (When
dropping leadings zeroes in a hardware
address, '00' becomes '0' -- you never
completely eliminate any of the six pairs of
digits.)
Representation of Addresses

47:20:1B:2E:08:EE
Ethernet Addresses
• Each frame transmitted on an Ethernet is
received by every adaptor connected to that
Ethernet.
• Each adaptor recognizes those frames addressed
to its address and passes only those frames on to
the host.
• In addition, to unicast address, an Ethernet
address consisting of all 1s is treated as a
broadcast address.
– All adaptors pass frames addressed to the broadcast
address up to the host.
• Similarly, an address that has the first bit set to 1
but is not the broadcast address is called a
Identification of Addressing Modes

• The addresses are identified based on the Last Bit of the


First Byte

• If ‘0’ – Unicast Address


• If ‘1’ – Multicast Address
• If All Bytes are ‘1’ – Broadcast Address
Classification of Addressing
Examples - addressing

• 4A:30:10:21:10:1A
This is a unicast address because A in binary is 1010

• 47:20:1B:2E:08:EE
This is a multicast address because 7 in binary is 0111

• FF:FF:FF:FF:FF:FF
This is a broadcast address because all digits are F’s
Ethernet Transmitter Algorithm
• When the adaptor has a frame to send and the
line is idle, it transmits the frame immediately.
– The upper bound of 1500 bytes in the message
means that the adaptor can occupy the line for a
fixed length of time.
• When the adaptor has a frame to send and the
line is busy, it waits for the line to go idle and
then transmits immediately.
• The Ethernet is said to be 1-persistent protocol
because an adaptor with a frame to send
transmits with probability 1 whenever a busy
line goes idle.
Persistence Methods
• What a station does when channel is idle or busy

35
P Persistent Method
Ethernet Transmitter Algorithm

• Since there is no centralized control it is


possible for two (or more) adaptors to begin
transmitting at the same time,
– Either because both found the line to be idle,
– Or, both had been waiting for a busy line to
become idle.
• When this happens, the two (or more) frames
are said to be collide on the network.
Ethernet Transmitter Algorithm
• Since Ethernet supports collision
detection, each sender is able to
determine that a collision is in progress.
• At the moment an adaptor detects that its
frame is colliding with another, it first
makes sure to transmit a 32-bit jamming
sequence and then stops transmission.
– Thus, a transmitter will minimally send 96
bits in the case of collision
• 64-bit preamble + 32-bit jamming
sequence
Ethernet Transmitter Algorithm

• One way that an adaptor will send only


96 bit (called a runt frame) is if the two
hosts are close to each other.
• Had they been farther apart,
– They would have had to transmit longer, and
thus send more bits, before detecting the
collision.
Ethernet Transmitter Algorithm
• The worst case scenario happens when
the two hosts are at opposite ends of the
Ethernet.
• To know for sure that the frame its just
sent did not collide with another frame,
the transmitter may need to send as many
as 512 bits.
– Every Ethernet frame must be at least 512 bits (64
bytes) long.
• 14 bytes of header + 46 bytes of data + 4 bytes
of CRC
Ethernet Transmitter Algorithm

• Why 512 bits?


– Why is its length limited to 2500 m?

• The farther apart two nodes are, the


longer it takes for a frame sent by one to
reach the other, and the network is
vulnerable to collision during this time
Ethernet Transmitter Algorithm
• A begins transmitting a frame at time t
• d denotes the one link latency
• The first bit of A’s frame arrives at B at time t + d
• Suppose an instant before host A’s frame arrives,
host B begins to transmit its own frame
• B’s frame will immediately collide with A’s frame
and this collision will be detected by host B
• Host B will send the 32-bit jamming sequence
• Host A will not know that the collision occurred
until B’s frame reaches it, which will happen at t + 2
*d
• Host A must continue to transmit until this time in
order to detect the collision
– Host A must transmit for 2 * d to be sure that it detects all
possible collisions
Ethernet Transmitter Algorithm

Worst-case scenario: (a) A sends a frame at time t; (b) A’s frame arrives
at B at time t + d; (c) B begins transmitting at time t + d and collides with A’s frame;
(d) B’s runt (32-bit) frame arrives at A at time t + 2d.
Ethernet Transmitter Algorithm
• Consider that a maximally configured Ethernet is
2500 m long, and there may be up to four
repeaters between any two hosts, the round trip
delay has been determined to be 51.2 s
– Which on 10 Mbps Ethernet corresponds to 512 bits

• The other way to look at this situation,


– We need to limit the Ethernet’s maximum latency to a
fairly small value (51.2 s) for the access algorithm to
work
• Hence the maximum length for the Ethernet is on the
order of 2500 m.
Ethernet Transmitter Algorithm
• Once an adaptor has detected a collision,
and stopped its transmission, it waits a
certain amount of time and tries again.
• Each time the adaptor tries to transmit but
fails, it doubles the amount of time it
waits before trying again.
• This strategy of doubling the delay
interval between each retransmission
attempt is known as Exponential Backoff.
Ethernet Transmitter Algorithm
• The adaptor first delays either 0 or 51.2 s,
selected at random.
• If this effort fails, it then waits 0, 51.2, 102.4,
153.6 s (selected randomly) before trying
again;
– This is k * 51.2 for k = 0, 1, 2, 3
• After the third collision, it waits k * 51.2 for
k = 0…23 – 1 (again selected at random).
• In general, the algorithm randomly selects a k
between 0 and 2n – 1 and waits for k * 51.2
s, where n is the number of collisions
experienced so far.
• EthernetsExperience with Ethernet
work best under lightly loaded
conditions.
– Under heavy loads, too much of the network’s capacity
is wasted by collisions.
• Most Ethernets are used in a conservative way.
– Have fewer than 200 hosts connected to them which is
far fewer than the maximum of 1024.
• Most Ethernets are far shorter than 2500m with a
round-trip delay of closer to 5 s than 51.2 s.
• Ethernets are easy to administer and maintain.
– There are no switches that can fail and no routing and
configuration tables that have to be kept up-to-date.

You might also like