Professional Documents
Culture Documents
Unit 3 - Computer Networks - WWW - Rgpvnotes.in
Unit 3 - Computer Networks - WWW - Rgpvnotes.in
Tech
Subject Name: Computer Networks
Subject Code: CS-602
Semester: 6th
Downloaded from www.rgpvnotes.in
Syllabus: MAC Sub layer: MAC Addressing, Binary Exponential Back-off (BEB) Algorithm, Distributed
Random Access Schemes/Contention Schemes: for Data Services (ALOHA and Slotted-ALOHA), for Local-
Area Networks (CSMA, CSMA/CD, CSMA/CA), Collision Free Protocols: Basic Bit Map, BRAP, Binary Count
Down, MLMA Limited Contention Protocols: Adaptive Tree Walk, Performance Measuring Metrics. IEEE
Standards 802 series & their variant.
MAC Sublayer
In the seven-layer OSI model of computer networking, media access control (MAC) data communication
protocol is a sublayer of the data link layer (layer 2). The MAC sublayer provides addressing and channel
access control mechanisms that make it possible for several terminals or network nodes to communicate
within a multiple access network that incorporates a shared medium, e.g. Ethernet. The hardware that
implements the MAC is referred to as a media access controller.
The MAC sublayer acts as an interface between the logical link control (LLC) sublayer and the network's
physical layer. The MAC layer emulates a full-duplex logical communication channel in a multi-point
network. This channel may provide unicast, multicast or broadcast communication service.
The first half of a MAC address contains the ID number of the adapter manufacturer. These IDs are
regulated by an Internet standards body. The second half of a MAC address represents the serial number
assigned to the adapter by the manufacturer.
In the example, 00:A0:C9:14:C8:29 The prefix 00A0C9 indicates the manufacturer is Intel Corporation.
Link: https://www.youtube.com/watch?v=WeGNeUHYv5g
Distributed Random Access Schemes/Contention Schemes: for Data Services (ALOHA and Slotted
ALOHA)
ALOHA: ALOHA is a system for coordinating and arbitrating access to a shared communication Networks
channel. The original system used for ground-based radio broadcasting, but the system has been
implemented in satellite communication systems.
A shared communication system like ALOHA requires a method of handling collisions that occur when two
or more systems attempt to transmit on the channel at the same time. In the ALOHA system, a node
transmits whenever data is available to send. If another node transmits at the same time, a collision
occurs, and the frames that were transmitted are lost. However, a node can listen to broadcasts on the
medium, even its own, and determine whether the frames were transmitted.
Aloha means "Hello". Aloha is a multiple access protocol at the datalink layer and proposes how multiple
terminals access the medium without interference or collision. A scientest developed a protocol that would
increase the capacity of aloha two-fold. The Slotted Aloha protocol involves dividing the time interval into
discrete slots and each slot interval corresponds to the time period of one frame. This method requires
synchronization between the sending nodes to prevent collisions.
There are two different versions
Types of ALOHA:
(i) Pure ALOHA
(ii) Slotted ALOHA
In slotted ALOHA, there is still a possibility of collision if two stations try to send at the beginning of the
same time slot.
Slotted ALOHA still has an edge over pure ALOHA as chances of collision are reduced to one-half.
CSMA protocol was developed to overcome the problem found in ALOHA i.e. to minimize the chances of
collision, so as to improve the performance. CSMA protocol is based on the principle of 'carrier sense'. The
station senses the carrier or channel before transmitting a frame. It means the station checks the state of
channel, whether it is idle or busy.
Even though devices attempt to sense whether the network is in use, there is a good chance that two
stations will attempt to access it at the same time. On large networks, the transmission time between one
end of the cable and another is enough that one station may access the cable even though another has
already just accessed it.
The chances of collision still exist because of propagation delay. The frame transmitted by one station
takes some time to reach other stations. In the meantime, other stations may sense the channel to be idle
and transmit their frames. This results in the collision.
Drawback of I-persistent
The propagation delay time greatly affects this protocol. Let us suppose, just after the station 1 begins its
transmission, station 2 also became ready to send its data and senses the channel. If the station 1 signal
has not yet reached station 2, station 2 will sense the channel to be idle and will begin its transmission.
This will result in collision.
Even if propagation delay time is zero, collision will still occur. If two stations became .ready in the middle
of third station's transmission, both stations will wait until the transmission of first station ends and then
both will begin their transmission exactly simultaneously. This will also result in collision.
• After this time, it again checks the status of the channel and if the channel is.free it will transmit.
• A station that has a frame to send senses the channel.
• If the channel is idle, it sends immediately.
• If the channel is busy, it waits a random amount of time and then senses the channel again.
• In non-persistent CSMA the station does not continuously sense the channel for the purpose of capturing
it when it detects the end of previous transmission.
Advantage of non-persistent
• It reduces the chance of collision because the stations wait a random amount of time. It is unlikely that
two or more stations will wait for same amount of time and will retransmit at the same time.
Disadvantage of non-persistent
• It reduces the efficiency of network because the channel remains idle when there may be stations with
frames to send. This is due to the fact that the stations wait a random amount of time after the collision.
• In case of the transmission by another station, the station acts as though a collision has occurred and it
waits a random amount of time and starts again.
Advantage of p-persistent
• It reduces the chance of collision and improves the efficiency of the network.
Again, this is what we do naturally in a meeting room if many people speak exactly the same time, they
are realizing account immediately (as they listen at the same time they speak), and they interrupt without
completing their sentence. After a while, one of them speaks again. If a new collision occurs, the two are
interrupted again and tend to wait a little longer before speaking again.
• If the station finds the channel busy, it does not restart the process. It just stops the timer & restarts it
when the channel is sensed as idle.
3. Acknowledgement
• Despite all the precautions, collisions may occur and destroy the data.
• The positive acknowledgment and the time-out timer can help guarantee that receiver has received the
frame.
LINK: https://www.youtube.com/watch?v=74zlRH-bj2c
Binary Countdown
In this protocol, a node which wants to signal that it has a frame to send does so by writing its address into
the header as a binary number. The arbitration is such that as soon as a node sees that a higher bit position
that is 0 in its address has been overwritten with a 1, it gives up. The final result is the address of the node
which is allowed to send. After the node has transmitted the whole process is repeated all over again.
Given below is an example situation.
Nodes Addresses
A 0010
B 0101
C 1010
D 1001
----
1010
Node C having higher priority gets to transmit. The problem with this protocol is that the nodes with higher
address always wins. Hence this creates a priority which is highly unfair and hence undesirable.
MLMA protocol
Multi-Level Multi-Access (MLMA): The problem with BRAP is the delay when the channel is lightly loaded.
When there is no frame to be transmitted, the N-bit headers just go on and on until a station inserts a 1
into its mini slot. On average, the waiting time would be N=2. MLAM scheme 41 is nearly as efficient under
high channel load, but has shorter delay under low channel load. In MLAM, a station wants to transmit a
frame sends its identification in a particular format. A group of 10 bits (called decade) is used to represent
a digit of the station number 48.
Obviously, it would be better if one could combine the best properties of the contention and contention -
free protocols, that is, protocol which used contention at low loads to provide low delay, but used a
contention-free technique at high load to provide good channel efficiency. Such protocols do exist and are
called Limited contention protocols.
It is obvious that the probability of some station acquiring the channel could only be increased by
decreasing the amount of competition. The limited contention protocols do exactly that. They first divide
the stations up into (not necessarily disjoint) groups. Only the members of group 0 are permitted to
compete for slot 0. The competition for acquiring the slot within a group is contention based. If one of the
members of that group succeeds, it acquires the channel and transmits a frame. If there is collision or no
node of a particular group wants to send then the members of the next group compete for the next slot.
The probability of a particular node is set to a particular value (optimum).
Adaptive Tree Walk Protocol
Initially all the nodes are allowed to try to acquire the channel. If it is able to acquire the channel, it sends
its frame. If there is collision then the nodes are divided into two equal groups and only one of these
groups compete for slot 1. If one of its member acquires the channel then the next slot is reserved for the
other group. On the other hand, if there is a collision then that group is again subdivided and the same
process is followed. This can be better understood if the nodes are thought of as being organised in a
binary tree.
In computing, a uniform resource name (URN) is the historical name for a uniform resource identifier (URI)
that uses the scheme. A URI is a string of characters used to identify a name of a web resource. Such
identification enables interaction with representations of the web resource over a network, typically the
World Wide Web, using specific protocols.
URNs were intended to serve as persistent, location-independent identifiers, allowing the simple mapping
of namespaces into a single URN namespace. The existence of such a URI does not imply availability of the
identified resource, but such URIs are required to remain globally unique and persistent, even when the
resource ceases to exist or becomes unavailable.
(Uniform Resource Name) A name that identifies a resource on the Internet. Unlike URLs, which use
network addresses (domain, directory path, file name), URNs use regular words that are protocol and
location independent. Providing a higher level of abstraction, URNs are persistent (never change) and
require a resolution service similar to the DNS system in order to convert names into real addresses. For
the most part, URNs have evolved into XRI identifiers (see XDI). See URI and URL.
Faster Ethernet runs on both optical fiber cable and unshielded twisted pair cable. Gigabit Ethernet
runs on either 1000BASE-T twisted pair cable, 1000BASE-X optical fiber or 1000BASE-CX shielded
balanced copper cable.
Fast Ethernet is economical but provides the slow transfer speed as compared to the Gigabit
Ethernet that provides the faster transfer rate but is very expensive. The ports of Gigabit Ethernet
cost four times the price per port of Fast Ethernet.
IEEE Standard for Gigabit Ethernet is IEEE 802.3-2008 and the IEEE Standards for Fast Ethernet are
802.3u-1995, 802.3u-1995 and 802.3u-1995.
Upgrade from simple Ethernet to Fast Ethernet is relatively simple and economical as compared to
the upgrade from Fast Ethernet to Gigabit Ethernet.
Gigabit Ethernet requires specifically designed network devices that can support the standard
1000Mbps data rate. Fast Ethernet requires no specific network devices.
Manual configuration is the must-have element in the setup of Gigabit Ethernet where most of the
devices required prior configuration in order to be compatible with Gigabit Ethernet. While in Fast
Ethernet there is no scene of configuration as connected devices automatically configured
according to the requirement of Fast Ethernet.
If you need the more bandwidth then Gigabit Ethernet will provide you the more bandwidth at the
best possible frequency as compared to the Fast Ethernet.
FDDI
The Fiber Distributed Data Interface (FDDI) specifies a 100-Mbps token-passing, dual-ring LAN using fiber-
optic cable. FDDI is frequently used as high-speed backbone technology because of its support for high
bandwidth and greater distances than copper. It should be noted that relatively recently, a related copper
specification, called Copper Distributed Data Interface (CDDI), has emerged to provide 100-Mbps service
over copper. CDDI is the implementation of FDDI protocols over twisted-pair copper wire. This article
focuses mainly on FDDI specifications and operations, but it also provides a high-level overview of CDDI.
FDDI uses dual-ring architecture with traffic on each ring flowing in opposite directions (called counter-
rotating). The dual rings consist of a primary and a secondary ring. During normal operation, the primary
ring is used for data transmission, and the secondary ring remains idle. As will be discussed in detail later in
this article, the primary purpose of the dual rings is to provide superior reliability and robustness.
fiber has several advantages over copper media. In particular, security, reliability, and performance all are
enhanced with optical fiber media because fiber does not emit electrical signals. A physical medium that
does emit electrical signals (copper) can be tapped and therefore would permit unauthorized access to the
data that is transiting the medium. In addition, fiber is immune to electrical interference from radio
frequency interference (RFI) and electromagnetic interference (EMI). Fiber historically has supported much
higher bandwidth (throughput potential) than copper, although recent technological advances have made
copper capable of transmitting at 100 Mbps. Finally, FDDI allows 2 km between stations using multimode
fiber, and even longer distances using a single mode.
FDDI defines two types of optical fiber: single-mode and multimode. A mode is a ray of light that enters the
fiber at a particular angle. Multimode fiber uses LED as the light-generating device, while single-mode fiber
generally uses lasers.
Multimode fiber allows multiple modes of light to propagate through the fiber. Because these modes of
light enter the fiber at different angles, they will arrive at the end of the fiber at different times. This
characteristic is known as modal dispersion. Modal dispersion limits the bandwidth and distances that can
be accomplished using multimode fibers. For this reason, multimode fiber is generally used for connectivity
within a building or a relatively geographically contained environment.
Single-mode fiber allows only one mode of light to propagate through the fiber. Because only a single
mode of light is used, modal dispersion is not present with single-mode fiber. Therefore, single-mode fiber
is capable of delivering considerably higher performance connectivity over much larger distances, which is
why it generally is used for connectivity between buildings and within environments that are more
geographically dispersed.
802.2 "specifies the general interface between the network layer (IP, IPX, etc) and the data link layer
(Ethernet, Token Ring, etc).
Basically, think of the 802.2 as the "translator" for the Data Link Layer. 802.2 is concerned with managing
traffic over the physical network. It is responsible for flow and error control. The Data Link Layer wants to
send some data over the network, 802.2 Logical Link Control helps make this possible. It also helps by
identifying the line protocol, like NetBIOS, or Netware.
The LLC acts like a software bus allowing multiple higher layer protocols to access one or more lower
layer networks. For example, if you have a server with multiple network interface cards, the LLC will
forward packers from those upper layer protocols to the appropriate network interface. This allows the
upper layer protocols to not need specific knowledge of the lower layer networks in use.
802.3 Ethernet
802.3 is the standard which Ethernet operates by. It is the standard for CSMA/CD (Carrier Sense Multiple
Access with Collision Detection). This standard encompasses both the MAC and Physical Layer standards.
CSMA/CD is what Ethernet uses to control access to the network medium (network cable). If there is no
data, any node may attempt to transmit, if the nodes detect a collision, both stop transmitting and wait a
random amount of time before retransmitting the data.
The original 802.3 standard is 10 Mbps (Megabits per second). 802.3u defined the 100 Mbps (Fast
Ethernet) standard, 802.3z/802.3ab defined 1000 Mbps Gigabit Ethernet, and 802.3ae define 10 Gigabit
Ethernet.
Commonly, Ethernet networks transmit data in packets, or small bits of information. A packet can be a
minimum size of 72 bytes or a maximum of 1518 bytes.
The token is a special frame which is designed to travel from node to node around the ring. When it does
not have any data attached to it, a node on the network can modify the frame, attach its data and
transmit. Each node on the network checks the token as it passes to see if the data is intended for that
node, if it is; it accepts the data and transmits a new token. If it is not intended for that node, it
retransmits the token on to the next node.
The token ring network is designed in such a way that each node on the network is guaranteed access to
the token at some point. This equalizes the data transfer on the network. This is different from an
Ethernet network where each workstation has equal access to grab the available bandwidth, with the
possible of a node using more bandwidth than other nodes.
Originally, token ring operated at a speed of about 4 Mbps and 16 Mbps. 802.5t allows for 100 Mbps
speeds and 802.5v provides for 1 Gbps over fibber.
Token ring can be run over a star topology as well as the ring topology.
There are three major cable types for token ring: Unshielded twisted pair (UTP), Shielded twisted pair
(STP), and fibber.
Token ring utilizes a Multi-station Access Unit (MAU) as a central wiring hub. This is also sometimes called
a MSAU when referring to token ring networks.
802.11a was one of the first wireless standards. 802.11a operates in the 5Ghz radio band and can achieve
a maximum of 54Mbps. Wasn't as popular as the 802.11b standard due to higher prices and lower range.
802.11b operates in the 2.4Ghz band and supports up to 11 Mbps. Range of up to several hundred feet in
theory. The first real consumer option for wireless and very popular.
802.11g is a standard in the 2.4Ghz band operating at 54Mbps. Since it operates in the same band as
802.11b, 802.11g is compatible with 802.11b equipment. 802.11a is not directly compatible with 802.11b
or 802.11g since it operates in a different band.
Wireless LANs primarily use CSMA/CA - Carrier Sense Multiple Access/Collision Avoidance. It has a "listen
before talk" method of minimizing collisions on the wireless network. This results in less need for
retransmitting data.