CS475 – Networks Assignments Lecture 6 Chapter 2: Getting Connected

advertisement
CS475 – Networks
Lecture 6
Chapter 2: Getting Connected
Assignments
• Reading for Lecture 7: Sections 3.1 – 3.2
2.6 Ethernet
Ethernet is the overwhelmingly most successful local area
Ethernet was developed by Xerox and is based on the Aloha
networking technology.
packet-radio network once used at the University of Hawaii.
Ethernet is a working example of carrier sense, multiple access
Ethernet was standardized as IEEE 802.3
with __________________________ (CSMA/CD) technology.
2.6.1 Physical Properties
Original Ethernet (______________________) used 10Base5
(10 Mbps/Baseband/500 m link) signaling.
Multiple hosts could be connected to the same cable and any
signal was received by all hosts.
Thin-net used 10Base2 (200 m). Twisted pair uses 10 or
100BaseT (100 m) signaling and CAT5 cable.
Fig 2.22 Ethernet transceiver and adaptor
Multiple thick-net segments could be joined together with (no
more than 4) ________________ for a total reach of 2500 m.
Thin-net segments could be joined similarly.
Fig. 2.23 Ethernet repeater
With 10/100BaseT a hub (multiway repeater) is used to connect
hosts and segments.
All hosts on segments connected by hubs or repeaters are in the
same ________________________________________.
Fig. 2.24 Ethernet hub
1 of 5
2.6.2 Access Protocol: Frame Format
An Ethernet frame has a 64 bit preamble of alternating 0s and 1s Each frame contains at least 46 bytes of data (64 total) and no
that are used for synch.
more than 1500 bytes. A 32 bit CRC is included in each frame.
Ethernet (_________) addresses are 48 bits. Each adaptor has a
unique address. The type field is used for demuxing higher
protocols.
Fig. 2.25 Ethernet frame format
2.6.2 Access Protocol: Addresses
Addresses are 48 bits (6 bytes). They are typically printed in hex A frame with a destination address of all 1s is a
with colons separating the bytes (8:0:2b:e4:b1:2).
_____________________ frame. A destination address with a
Manufacturers have their own prefix to ensure that each adaptor leading 1 (but not a broadcast address) is a multicast frame.
has a unique address.
2.6.2 Access Protocol: Transmitter Algorithm
When an adaptor has a frame to send and it senses that the line is When an adaptor detects that a frame it sent has collided with
idle, it transmits the frame immediately. If the line is busy, it
another frame it stops transmitting and immediately transmits a
waits for the line to go idle and then transmits the frame.
32 bit jamming sequence.
Due to propagation delays, ____________________ can occur.
In the worst case, A and B are widely separated and B starts
Adaptors give up after 16 tries and report an error to the host.
transmitting just as A's frame reaches B.
A's frame must be at least 2 x 2500 m / 3 x 108 m/s = 16.67 μs
long in order to detect the collision. Ethernet specifies a min.
length of 51.2 μs (512 bits or 64 bytes at 10 Mbps.)
Once a collision has been detected the adaptor waits before
transmitting the frame again. ___________________________
is used. It firsts waits either (randomly) 0 or 51.2 μs. If there is
another collision it waits either 0, 51.2, 102.4 or 153.6 μs and so
on.
In general, a k value is randomly selected between 0 and 2n – 1
(n is the number of collisions). The adaptor waits k x 51.2 μs.
2 of 5
Fig. 2.26 Worst-case collision scenario
2.6.3 Experiences with Ethernet
Multi-access Ethernet has been used primarily in situations
Ethernet characteristics that made it successful
where there are fewer than 200 hosts and distances in the 100s of
•
Original Ethernet easy to administer and maintain - no
meters, since collisions waste network capacity. E.g. in a room
switches, no configuration tables, just add a tap to the
to a hub connected to switch in a wiring closet.
network wire.
•
Inexpensive - coaxial cable is cheap, one network
adapter per host.
Switched networks needed to similar. Resulted in ___________
Ethernet. Most Ethernet links are now point-to-point between
hubs, switches, and routers.
2.7 Wireless
Wireless networks share some common characteristics with
Wireless networks differ from wired networks in several ways
wired networks
•
Bit errors are of great concern
•
Media is inherently multi-access
•
Low power, especially small mobile devices
•
Limits on transmission power and frequency, uses
___________________ to minimize interference from
other devices.
Table 2.4 Overview of Leading Wireless Technologies
Typical link length
Typical BW
Typical use
Wired analog
Bluetooth 802.15.1
10 m
2.1 Mbps (shared)
Peripherals to computer
(PAN)
USB
WiFi 802.11
100 m
54 Mbps (shared)
Laptop to network
3G Cellular
Tens of km
384+ kbps
Cell phone to Internet
Ethernet
DSL
Most wireless links are asymmetric. One node (the
_____________________) is not mobile and has a wired (or
high BW) connection to another network.
Even though radio waves transmitted by one client may be
received by another, all node-to-node comm. is routed through
the base station.
Fig 2.28 A wireless network using a base station
3 of 5
The base station topology is associated with three levels of
mobility: (1) no mobility (original WiMAX), (2) mobility within
the range of a base (Bluetooth), and (3) mobility between bases
(WiFi, cell phones).
An alternative topology is the _________________________
network in which there is no base station. All nodes are peers
and communicate with neighbors. Messages may be forwarded
along a chain of peer nodes.
Fig 2.29 A wireless mesh or ad hoc network
2.7.1 802.11 / WiFi
WiFi runs over six different physical layer protocols. The original 802.11 defined spread spectrum and direct sequence channels at
2 Mbps. 802.11b defined a new channel operating at 11 Mbps. All operated at 2.4 GHz. 802.11a delivers up to 54 Mbps and
operates at 5 GHz. 802.11g went back to 2.4 GHz and delivers up to __________________________.
Most commercial products support 802.11a, 802.11b, and 802.11g to ensure compatibility with all WiFi devices.
2.7.2 802.11 / WiFi - Collision Avoidance
Due to hidden nodes collision _________________________ is
Clear to Send (CTS) from the receiver. Any adjacent nodes that
used instead of collision detection.
see the CTS do not transmit.
The sender sends a Request to Send (RTS) packet waiting for a
Fig. 2.30 Hidden Node
Fig. 2.31 Exposed Node
4 of 5
2.7.2 802.11 / WiFi - Scanning
To enable initial connection and mobility between
2) All APs within range send a Probe Response.
______________________________ (APs):
3) The node sends an Assoc. Request to one AP
1) A node sends a Probe.
4) The AP responds with an Assoc. Response frame
Fig. 2.32/2.33 Node Mobility
Fig. 2.32/2.33 Node Mobility
2.7.2 802.11 / WiFi - Frame Format
A WiFi frame can carry up to 2,312 data bytes. The ____________________ field indicates if the frame is an RTS or CTS and also
contains the ToDS and FromDS bits.
If two nodes are directly comm. both DS bits are 0, Addr1 ids the destination and Addr2 the source. In the more complex case
where two nodes use two different APs, both bits are 1 and the AP addresses are included in the frame.
Fig. 2.34 WiFi Frame Format
2.7.2 Bluetooth (802.15.1)
Bluetooth operates in the license exempt band of 2.45 GHz. It
offers speeds up to 2.1 Mbps and low power consumption. It has
a short range of only 10 m.
A Bluetooth _________________________ consists of a master
device and up to seven active slave devices (up to 255 devices
can be inactive or parked). All comm. is through the master.
Bluetooth uses spread spectrum across 79 channels to prevent
interference with other devices operating at 2.45 GHz.
Fig 2.35 A Bluetooth piconet
5 of 5
Download