Beruflich Dokumente
Kultur Dokumente
1
4.1 The Channel Allocation Problem
2
4.1.1 Static Channel Allocation in LANs and MANs
A simple queuing theory calculation
For a channel of capacity C bps, with an arrival
rate of λ frames/sec, each frame having a length
drawn from an exponential probability density
function with mean 1/μ bits/frame, the mean
time delay is defined as 1
T=
μC − λ
4
4.1.2 Dynamic Channel Allocation in LANs and MANs
5
4.1.2 Dynamic Channel Allocation in LANs and MANs
6
4.1.2 Dynamic Channel Allocation in LANs and MANs
7
4.1.2 Dynamic Channel Allocation in LANs and MANs
8
4.1.2 Dynamic Channel Allocation in LANs and MANs
9
4.2 Multiple Access Protocols
4.2.1 ALOHA
ALOHA of U. of Hawaii
Pure ALOHA
Computer
Center
413MHz at 9600bps
407MHz at 9600bps
11
Pure ALOHA
12
nodes
S collision?
new frame channel
G No S
old frame
Yes
pure ALOHA
time
slotted ALOHA
slot
time
Other nodes that are ready at this period will result in collision.
15
The probability that k frames are generated during a given
frame time is given by the Poisson distribution:
G k e−G
Pr[k ] = So the probability of zero frames in a
k! slot is just e-G.
17
4.2.1 ALOHA
18
4.2.2 Carrier Sense Multiple Access Protocols
19
4.2.2 Carrier Sense Multiple Access Protocols
20
21
CSMA with collision detection (CSMA/CD)
22
A conceptual model for CSMA/CD
23
4.2.2 Carrier Sense Multiple Access Protocols
25
4.2.5 Wavelength Division Multiple Access Protocols
26
4.2.5 Wavelength Division Multiple Access Protocols
27
4.2.5 Wavelength Division Multiple Access Protocols
28
4.2.6 Wireless LAN Protocols
29
4.2.6 Wireless LAN Protocols
30
4.2.6 Wireless LAN Protocols
31
MACA (Multiple Access with Collision Avoidance)
RTS (Request To Send, 30 bytes) contains the data length that will
eventually follow.
CTS (Clear To Send) frame contains the data length (copied from
the RTS frame)
32
MACA (Multiple Access with Collision Avoidance)
33
MACA (Multiple Access with Collision Avoidance)
34
MACA (Multiple Access with Collision Avoidance)
35
4.2.6 Wireless LAN Protocols
36
Ethernet
37
Ethernet
38
39
To allow larger networks, multiple cables can be connected
by repeaters.
40
Cable topologies: (a) Linear, (b) Spine, (c) Tree, (d) Segmented
41
Manchester Encoding
42
802.3 frame format
0 single address
1 group address multicast (all 1's for broadcast)
0 local address No significance outside
46
1 global address one of 2 unique address
43
802.3 frame format
Minimum frame length: 64 bytes
44
The Binary Exponential Backoff Algorithm
after third
collision
select one to start transmission
45
Acknowledgements
46
47
Many theoretical analysis assume the input traffic is Poisson.
It now appears that network traffic is rarely Poisson, but self-
similar. What this means is that averaging over long periods
of time does not smooth out the traffic.
48
Switched 802.3 LANs
49
Fast Ethernet
50
Fast Ethernet
The basic idea behind fast Ethernet was simple: keep all the old
packet formats, interfaces, and procedural rules, but just reduce
the bit time form 100 nsec to 10 nsec.
51
Fast Ethernet
52
Fast Ethernet
Of the four twisted pairs, one is always to the hub, one is always
from the hub, and the other two are switchable to the current
transmission direction.
53
Fast Ethernet
55
Why Ethernet is so successful? Last more than 20 years!
56
Data Link Layer Switching
Bridge
A
C
57
Data Link Layer Switching
Router
A
C
Router
58
Data Link Layer Switching
60
Data Link Layer Switching
Transparent Bridges
Transparent Bridges
When the bridges are first plugged in, all the hash tables are
empty. None of the bridges know where any of the destinations
are, so they use the flooding algorithm.
Transparent Bridges
63
Data Link Layer Switching
Transparent Bridges
64
Data Link Layer Switching
65
Data Link Layer Switching
66
Data Link Layer Switching
•To build the spanning tree, first the bridges have to choose
one bridge to be the root of the tree.
•They make this choice by having each one broadcast its serial
number, installed by the manufacturer, and guaranteed to be
unique worldwide.
• The bridge with the lowest serial number becomes the root.
•Next, a tree of shortest paths from the root to every bridge and
LAN is constructed.
•If a bridge or LAN fails, a new one is computed.
67
Data Link Layer Switching
68
Data Link Layer Switching
Source Routing Bridges
This path is constructed as follows:
Each LAN has a unique 12-bit number, and each bridge has a 4-bit
number that uniquely identifies it in the context of its LANs. A
route is then a sequence of bridge, LAN, bridge, LAN, … numbers.
For example, the route from A to D: (L1, B1, L2, B2, L3)
69
Data Link Layer Switching
For each such frame, it scans the route looking for the number
of the LAN on which the frame arrived.
70
Data Link Layer Switching
Source Routing Bridges
Three possible implementations:
1. Software: the bridge runs in promiscuous mode, copying all frames to its
memory to see if they have the high-order destination bit set to 1. If so, the
frame is inspected further.
2. Hybrid: the bridge’s LAN interface inspects the high-order destination bit
and only accepts frame with the bit set. This interface is easy to build into
hardware and greatly reduces the number of frames the bridge must inspect.
3. Hardware: the bridge’s LAN interface not only checks the high-order
destination bit, but it also scans the route to see if this bridge must do
forwarding. Only frames that must actually be forwarded are given to the
bridge. This implementation requires the most complex hardware but wastes
no bridge CPU cycles because all irrelevant frames are screened out.
71
Data Link Layer Switching
72
Data Link Layer Switching
73
74
Data Link Layer Switching
Remote Bridges
75
Data Link Layer Switching
76
Repeaters:
• are analog devices that are connected to two cable segments
• A signal appearing on them is amplified, and put on the other
• Do not understand frames, packets or headers
– Only understand VOLTS
Hubs:
• Has a number of input lines that it joins electrically
• The entire hub forms a single collision domain
• All the input lines must operate at the same speed
– Difference: Hubs do not amplify the incoming signals, and are designed
to hold multiple line cards each with multiple inputs
– Similarity: Both do not examine the 802 address or use them in any way
77
Data Link Layer Switching
78
Bridges:
• Connects two or more LAN… etc
• With a bridge, each line is its own collision domain as compared
to the Hub
Switches:
• Similar to bridges
• Main difference is that a switch is most often used to connect
individual computers
79
Router:
• Different from all of the above. When a packet come into a router:
– the frame and trailer are stripped off, and
– the packet located in the frames’ payload field is passed to the routing
software
• The routing software does not see the frame address, and does not
even know whether the packet came in on a LAN or a point-to-
point line
Transport Gateway:
• These connect two computers that use different connection-
oriented protocols (TCT/IP Vs ATM transport protocol)
Application Gateway:
• Understand the format and contents of the data, and translate
messages from one format to another
– An email gateway could translate Internet message into SMS for mobile
80
Summary
81