Topic 5: Local Area Network Technology 1 Local Area Networks • • • • Small geographical area High reliability High Data Rate Privately owened 2 Parameters that characterizes a LAN • Topology • Transmission media • Medium access control techniques 3 LAN Topology • Arrangement of workstations in a shared medium environment • Logical arrangement (data flow) • Physical arrangement (cabling scheme) 4 LAN Topologies: Bus • • • • Multipoint medium Stations attach to linear medium (bus) using tap Full-duplex between station and tap Transmission from any stations travels entire medium (both directions) • Termination required at ends of bus 5 Bus LAN Diagram 6 LAN Topologies: Tree • Generalization of bus topology • Branching cable with no closed loops • Cable(s) begin at headend, travel to branches which may have branches of their own • Each transmission propagates through network, can be received by any station 7 Tree LAN Diagram 8 Bus/Tree Topology Problems • How do you identify who the transmission is intended for? —Data transmitted in frames —Each frame has header with addressing info • How do you regulate access? —Stations take turns sending, by monitoring control information in frames 9 LAN Topologies: Ring • Repeaters are joined by unidirectional point-topoint links in a ring • As a frame circulates past a receiver, the receiver checks its address, and copies those intended for it into a local buffer • Frame circulates until it returns to source, which removes it from network 10 Ring LAN Diagram 11 LAN Topologies: Star • Each station connected directly to central node, usually with two unidirectional links • Central node can broadcast info, or can switch frames among stations 12 Star LAN Diagram 13 Choosing a Topology • Factors to consider include —reliability, flexibility/expandability, and performance —Needs considering in context of: • Medium • Wiring layout • Access control • • • • Bus/tree is most flexible Tree topology easy to lay out Ring provides high throughput, but reliability problems Star can be high speed for short distances, but has limited expandability 14 Bus LAN Transmission Media (1) • Twisted pair —Early LANs used voice grade cable —Didn’t scale for fast LANs —Not used in bus LANs now • Baseband coaxial cable —Uses digital signalling —Original Ethernet Bus LAN Transmission Media (2) • Broadband coaxial cable — — — — As in cable TV systems Analog signals is used at radio frequencies Expensive, hard to install and maintain No longer used in LANs • Optical fiber — Expensive taps — Better alternatives available — Not used in bus LANs • All hard to work with compared with star topology twisted pair • Coaxial baseband still used but not often in new installations Medium and Topology 17 Medium Access Control Provides a means of controlling access to a shared medium 18 Medium Access Control 19 Medium Access Protocols In broadcast network to make the medium available to all the nodes a scheme must be introduced and this scheme is called Medium Access protocols 20 Types Multiple Access Protocols • Fixed assignment /channel Partitioning • Random assignment • Demand assignment/Taking turns 21 Fixed Assignment technique • Allocate the channel in a static manner. This allocation scheme doesn’t depend on the demands of the nodes • Types —Frequency Division Multiplexing(FDMA) —Time Division Multiplexing(TDMA) —Code division Multiplexing (CDMA) 22 TDMA TDMA: time division multiple access access to channel in "rounds" each station gets fixed length slot (length = pkt trans time) in each round unused slots go idle example: 6-station LAN, 1,3,4 have pkt, slots 2,5,6 idle 6-slot frame 6-slot frame 1 3 4 1 3 4 Link Layer 523 FDMA FDMA: frequency division multiple access channel spectrum divided into frequency bands each station assigned fixed frequency band unused transmission time in frequency bands go idle example: 6-station LAN, 1,3,4 have pkt, frequency bands 2,5,6 idle FDM cable frequency bands Link Layer 524 Random Assignment Technique • Random access or contention methods, no station is superior to another station and none is assigned control over another. At each instance, a station that has data to send uses a procedure defined by the protocol to make a decision or whether or not to send. This decision depends on the state of the medium (idle or busy) 25 Random Assignment Technique • Types —AlOHA • • • • • Pure ALOHA Sloted ALOHA CSMA CSMA/CD CSMA/CA 26 ALOHA • was developed at the University of Hawaii in early 1970. • Designed for a radio (wireless) LAN. • The medium is shared between the stations. When a station sends data, another station may attempt to do so at the same time. The data from the two stations collide and become garbled. 27 Pure (unslotted) ALOHA • unslotted Aloha: simpler, no synchronization • when frame first arrives —transmit immediately • collision probability: frame sent at t0 collides with other frames sent in [t0-1,t0 ] 28 Procedure for Pure ALOHA Protocol 29 Slotted ALOHA assumptions: • all frames same size • time divided into equal size slots (time to transmit 1 frame) • nodes are synchronized • nodes start to transmit only at slot-beginning • if 2 or more nodes transmit in same slot, all nodes detect collision operation: • when node obtains fresh frame, transmits in next slot • if no collision: node can send new frame in next slot • if collision: node retransmits frame in each subsequent slot with prob= p until success 30 Frame in Pure ALOHA Network 31 Pros: • single active node can continuously transmit at full rate of channel • highly decentralized: only slots in nodes need to be in sync • simple Cons: • collisions, wasting slots • idle slots • nodes may be able to detect collision in less than time to transmit packet • clock synchronization 32 CSMA (carrier sense multiple access) • CSMA: listen before transmit: • if channel sensed idle: transmit entire frame • if channel sensed busy, defer transmission human analogy: don’t interrupt others! 33 • collisions can still occur: propagation delay means two nodes may not hear each others transmission • collision: entire packet transmission time wasted • distance & propagation delay play role in determining collision probability 34 CSMA/CD (collision detection) • carrier sensing & transmission deferral as in CSMA • collisions detected within short time • colliding transmissions aborted, reducing channel wastage • collision detection: — easy in wired LANs: measure signal strengths, compare transmitted, received signals — difficult in wireless LANs: received signal strength overwhelmed by local transmission strength 35 Collision of the first bits in CSMA/CD 36 CSMA/CA • Carrier sense multiple access with collision avoidance (CSMA/CA). • Was invented for wireless network. 37 Controlled-access protocols • In controlled access, the stations consult on another to find which station has the right to send. • A station cannot send unless it has been authorized by other stations. Types • Reservation • Polling • Token passing 38 Reservation • Time is divided into intervals. • A station needs to make a reservation before sending data. 39 “Taking turns” protocols channel partitioning MAC protocols: share channel efficiently & fairly at high load inefficient at low load as 1/N of bandwidth allocated even if only one active node! random access MAC protocols efficient at low load: single node can fully utilize channel Inefficient at high load due to high collision overhead “taking turns” protocols look for best of both worlds! Link Layer 540 “Taking turns” rotocols polling: master node “invites” slave nodes to transmit in turn typically used with “dumb” slave devices concerns: polling overhead latency single point of failure (master) data poll master data slaves Link Layer 541 “Taking turns” protocols token passing: control token passed from one node to next sequentially. token message concerns: token overhead latency single point of failure (token) T (nothing to send) T data Link Layer 542 LAN Standards (IEEE802.x) • Advantages of standards —Assure sufficient volume to keep costs down —Enable equipment from various sources to interconnect • IEEE 802 committee developed, revises, and extends standards • Use a three-layer protocol hierarchy: physical, medium access control (MAC), and logical link control (LLC) 43 44 IEEE LAN Standards • • • • • • • • • • IEEE 802.2: Logic link control (LLC) layer of data link layer IEEE 802.3: Ethernet IEEE 802.4: Token bus, an old protocol IEEE 802.5: Token ring IEEE 802.6: Distributed queue dual bus (DQDB) protocol, similar to FDDI IEEE 802.9: Integrated voice and data networking, including ISDN, Iso-ethernet IEEE 802.11: Wireless LAN IEEE 802.12: 100Base-VG IEEE 802.13: 100Base-X IEEE 802.14: Cable modem 45 *Logical Link Control • Specifies method of addressing and controls exchange of data • Independent of topology, medium, and medium access control • Unacknowledged connectionless service (higher layers handle error/flow control, or simple apps) • Connection-mode service (devices without higher-level software) • Acknowledged connectionless service (no prior connection necessary) 46 *Medium Access Control • Provides a means of controlling access to a shared medium • Two techniques in wide use —CSMA/CD —Token passing • LLC frames data, passes it to MAC which frames it again —MAC control (e.g. priority level) —Destination physical address —Source physical address 47 Ethernet (IEEE 802.3) The Ethernet LAN standard was originally developed by DEC, Xerox, and Intel, but has since become a formalized standard by the Institute of Electrical and Electronics Engineers as IEEE 802.3 48 49 Ethernet Topology Ethernet uses a bus topology (a high speed circuit and a limited distance between the computers, such as within one building). From the outside, an ethernet LAN appears to be a star, because all cables connect to the central hub. Most ethernet LANs span sufficient distance to require several hubs, but some ethernet LANs are build without the use of hubs (coax bus). 50 Ethernet Media Access Control Carrier Sense Multiple Access with Collision Detection (CSMA/CD) • • • • Wait until the bus is free and then transmit. If no collision, transmission is completed. If the collision is detected, send a jamming signal. Wait a random amount of time, then re-broadcast. 51 Token Ring (IEEE 802.5) Token Ring was originally developed by IBM, and have since been standardized by IEEE as IEEE 802.5. 52 Topology 53 Token Ring Media Access Control • Token ring uses a controlled-access technique called token passing. • The “token” is a series of bits, travels between the computers in a predetermined sequence. • A computer with a message waits to transmit until it receives a free token. The computer changes the free token to a busy token and attaches its message to it. Then it retransmits it on the circuit to the next computer in the sequence. • The computer receiving the message, changes the acknowledgement to ACK (or NAK) and sends the message back to the sender, who creates a new free token. 54 Token Ring Media Access Control 55 Token Ring Media Access Control 56 Token Ring Media Access Control Token loss: • The token crashes before being transmitted - lost a free token • A computer in the ring crashes - lost a busy token • A token is always busy. A solution for the “lost” token problem: • Designate one computer to be the token monitor and another computer to be a backup token monitor. • If no token circulated through the network for a certain length of time or if a busy token circulates too often, the token monitor will create a new free token (and destroy the busy token if necessary.) 57