Ch13 Ethernet

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 62

Chapter 13

Wired LANs: Ethernet

13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
13-1 IEEE STANDARDS

In 1985,,,, the Computer Society of the IEEE started a


project, called Project 802, to set standards to enable
intercommunication among equipment from a variety
of manufacturers.
Project 802 is a way of specifying functions of the
physical layer and the data link layer of major LAN
protocols.

Topics discussed in this section:


Data Link Layer
Physical Layer
13.2
Figure 13.1 IEEE standard for
LANs

13.3
13-2 STANDARD ETHERNET

The original Ethernet was created in 1976 at Xerox’s


Palo Alto Research Center (PARC). Since then, it has
gone through four generations.. We briefly discuss the
Standard (or traditional) Ethernet in this section.

Topics discussed in this section:


MAC Sublayer
Physical
Layer

13.4
Figure 13.3 Ethernet evolution through four generations

13.5
Figure 13.4 802.3 MAC frame

13.6
Figure 13.5 Minimum and maximum lengths

13.7
Note

Frame length:
Minimum: 64 bytes (512 bits)
Maximum: 1518 bytes
(12,144 bits)

13.8
Figure 13.6 Example of an Ethernet address in hexadecimal notation
The transmission is left to right, byte by byte;
however, for each byte, the least significant bit is sent first and the most significant bit is sent
last. This means that the bit that defines an address as unicast or multicast arrives first at the
receiver. This helps the receiver to immediately know if the packet is unicast or multicast.

13.9
Figure 13.7 Unicast and multicast addresses

13.10
Note

The least significant bit of the first byte


defines the type of address.
If the bit is 0, the address is unicast;
otherwise, it is multicast.

13.11
Note

The broadcast destination address is a


special case of the multicast address in
which all bits are 1s.

13.12
Example 13.1

Define the type of the following destination addresses:


a 4A:30:10:21:10:1A b 47:20:1B:2E:08:EE
c. FF:FF:FF:FF:FF:FF
Solution
To find the type of the address, we need to look at the
second hexadecimal digit from the left. If it is even, the
address is unicast. If it is odd, the address is multicast. If
all digits are F’s, the address is broadcast. Therefore,
we have the following:
a. This is a unicast address because A in binary is 1010.
b. This is a multicast address because 7 in binary is
0111.
c. This is a broadcast address because all digits are F’s.
13.13
Example 13.2

Show how the address 47:20:1B:2E:08:EE is sent out on


line.

Solution
The address is sent left-to-right, byte by byte; for each
byte, it is sent right-to-left, bit by bit, as shown
below:

13.14
Figure 13.8 Categories of Standard Ethernet

13.15
Figure 13.9 Encoding in a Standard Ethernet implementation

13.16
Figure 13.10 10Base5 implementation

13.17
Figure 13.11 10Base2 implementation

13.18
Figure 13.12 10Base-T implementation

13.19
Figure 13.13 10Base-F implementation

13.20
Table 13.1 Summary of Standard Ethernet implementations

13.21
13-3 CHANGES IN THE STANDARD

The 10-Mbps Standard Ethernet has gone through


several changes before moving to the higher data
rates..
These changes actually opened the road to the
evolution of the Ethernet to become compatible with
other high-data-rate LANs..

Topics discussed in this section:


Bridged Ethernet
Switched Ethernet
Full-Duplex Ethernet
13.22
Figure 13.14 Sharing bandwidth

13.23
Figure 13.15 A network with and without a
bridge

13.24
Figure 13.16 Collision domains in an unbridged network and a bridged
network

13.25
Figure 13.17 Switched Ethernet

Bandwidth shared only between the station and the switch 5Mbps each

13.26
Figure 13.18 Full-duplex switched Ethernet

13.27
13-4 FAST ETHERNET

Fast Ethernet was designed to compete with LAN


protocols such as FDDI or Fiber Channel.
IEEE created Fast Ethernet under th nam 80 .. u..
Fast Ethernet is backward-compatible with Standard
Ethernet, but it can transmit data 10 times faster at a
rate of 100 Mbps.

Topics discussed in this section:


MAC Sublayer
Physical
Layer
13.28
Fast Ethernet

The goals of Fast Ethernet can be summarized as


follows:
1. Upgrade the data rate to 100 Mbps.
2. Make it compatible with Standard Ethernet.
3. Keep the same 48-bit address.
4. Keep the same frame format.
Autonegotiation
•A new feature added to Fast Ethernet is called
autonegotiation.
• It allows a station or a hub a range of capabilities.
Autonegotiation allows two devices to negotiate the mode
or data rate of operation.
•It was designed particularly to allow incompatible
devices to connect to one another. For example, a device
with a maximum data rate of 10 Mbps can communicate
with a device with a 100 Mbps data rate (but which can
work at a lower rate).
Figure 13.19 Fast Ethernet topology

13.31
Figure 13.20 Fast Ethernet implementations

13.32
Figure 13.21 Encoding for Fast Ethernet implementation

13.33
Table 13.2 Summary of Fast Ethernet implementations

13.34
13-5 GIGABIT ETHERNET

The need for an even higher data rate resulted in the


design of the Gigabit Ethernet protocol (1000 Mbps).
The IEEE committee calls the standard 802..3z..

Topics discussed in this section:


MAC Sublayer
Physical
Layer
Ten-Gigabit
Ethernet
13.35
Note

In the full-duplex mode of Gigabit


Ethernet, there is no collision;
the maximum length of the cable is
determined by the signal
attenuation in the cable.

13.36
Figure 13.22 Topologies of Gigabit Ethernet

13.37
Figure 13.23 Gigabit Ethernet implementations

13.38
Figure 13.24 Encoding in Gigabit Ethernet implementations

13.39
Table 13.3 Summary of Gigabit Ethernet implementations

13.40
Table 13.4 Summary of Ten-Gigabit Ethernet implementations

13.41
The efficiency of the Ethernet is defined as the ratio of
the time used by a station to send data to the time the
medium is occupied by this station.
The practical efficiency of standard Ethernet has been
measured to be in which the parameter “a” is the number
of frames that can fit on the medium. It can be calculated
as a = (propagation delay)/(transmission delay) because
the transmission delay is the time it takes a frame of
average size to be sent out and the propagation delay is
the time it takes to reach the end of the medium.
Note that as the value of parameter a decreases, the
efficiency increases. This means that if the length of the
media is shorter or the frame size longer, the efficiency
increases. In the ideal case, a = 0 and the efficiency is 1.
wireless LAN

Architectural Comparison
Medium
Hosts
Isolated LANs
Connection to Other Networks
Moving between Environments
Characteristics

Attenuation
Interference
Multipath Propagation
Error
The CSMA/CD algorithm does not work in wireless LANs for
three reasons:
1. To detect a collision, a host needs to send and receive at the
same time (sending the frame and receiving the collision signal),
which means the host needs to work in a duplex mode.
Wireless hosts do not have enough power to do so (the power is
supplied by batteries). They can only send or receive at one time.
2. Because of the hidden station problem, in which a station may
not be aware of another station’s transmission due to some
obstacles or range problems, collision may occur but not be
detected
3. The distance between stations can be great. Signal fading
could prevent a station at one end from hearing a collision at
the other end.
Access Control
IEEE 802.11 PROJECT
Basic Service Set
A basic service set is made of stationary or mobile
wireless stations and an optional central base station,
known as the access point (AP).
Extended Service Set
An extended service set (ESS) is made up of two or more
BSSs with APs.
In this case, the BSSs are connected through a
distribution system, which is a wired or a wireless
network.
MAC sublayer
MAC Sublayer

IEEE 802.11 defines two MAC sublayers: the distributed


coordination function (DCF) and point coordination
function (PCF).
DCF uses CSMA/CA as the access method
NAV

When a station sends an RTS frame, it includes the


duration of time that it needs to occupy the channel.
The stations that are affected by this transmission create
a timer called a network allocation vector (NAV) that
shows how much time must pass before these stations are
allowed to check the channel for idleness.
Each time a station accesses the system and sends an
RTS frame, other stations start their NAV.
In other words, each station, before sensing the physical
medium to see if it is idle, first checks its NAV to see if it
has expired.
Point Coordination Function (PCF)

The point coordination function (PCF) is an optional


access method that can be implemented in an
infrastructure network (not in an ad hoc network).

It is implemented on top of the DCF and is used mostly


for time-sensitive transmission.

PCF has a centralized, contention-free polling access


method,
PCF has a centralized, contention-free polling access
method,
Due to the priority of PCF over DCF, stations that only
use DCF may not gain access to the medium.
To prevent this, a repetition interval has been designed to
cover both contention-free PCF and contention-based
DCF traffic.
The repetition interval, which is repeated continuously,
starts with a special control frame, called a beacon
frame.
When the stations hear the beacon frame, they start their
NAV for the duration of the contention-free period of the
repetition interval
Frame format
Frame control (FC). The FC field is 2 bytes long and
defines the type of frame and some control information.
This field defines the duration of the transmission that is used to set the
value of NAV. In one control frame, it defines the ID of the frame.
❑ Addresses. There are four address fields, each 6 bytes long. The
meaning of each address field depends on the value of the To DS and
From DS subfields and will be discussed later.
❑ Sequence control. This field, often called the SC field, defines a 16-bit
value. The first four bits define the fragment number; the last 12 bits
define the sequence number, which is the same in all fragments.
❑ Frame body. This field, which can be between 0 and 2312 bytes,
contains information based on the type and the subtype defined in the FC
field.
❑ FCS. The FCS field is 4 bytes long and contains a CRC-32 error-
detection sequence.
Addressing Mechanism

The IEEE 802.11 addressing mechanism specifies four


cases, defined by the value of the two flags in the FC
field, To DS and From DS. Each flag can be either 0 or
1, resulting in four different situations.
Case 1: 00 In this case, To DS = 0 and From DS = 0. This
means that the frame is not going to a distribution system
(To DS = 0) and is not coming from a distribution
system (From DS = 0).
The frame is going from one station in a BSS to another
without passing through the distribution system.
Case 2: 01 In this case, To DS = 0 and From DS = 1. This
means that the frame is coming from a distribution system
(From DS = 1). The frame is coming from an AP and going to a
station.
Case 3: 10 In this case, To DS = 1 and From DS = 0. This
means that the frame is going to a distribution system (To DS =
1). The frame is going from a station to an AP. The ACK is sent
to the original station.
Case 4: 11 In this case, To DS = 1 and From DS = 1. This is the
case in which the distribution system is also wireless. The frame
is going from one AP to another AP in a wireless distribution
system. Here, we need four addresses to define the original
sender, the final destination, and two intermediate APs.

You might also like