SlideShare a Scribd company logo
Direct Link Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encoding ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Bits NRZ 0 0 1 0 1 1 1 1 0 1 0 0 0 0 1 0
Problems: Consecutive 1s or 0s ,[object Object],[object Object],[object Object],[object Object]
Alternative Encodings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encodings (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encodings (cont) Bits NRZ Clock Manchester NRZI 0 0 1 0 1 1 1 1 0 1 0 0 0 0 1 0
Framing ,[object Object],[object Object],Frames Bits Adaptor Adaptor Node B Node A
Approaches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Header Body 8 16 16 8 CRC Beginning sequence Ending sequence
Approaches (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Approaches (cont) ,[object Object],[object Object],[object Object]
Handling Errors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Error Detecting and Correcting Codes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Error Detection Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyclic Redundancy Check ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CRC (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CRC Example Generator 1101 11111001 10011010 000 Message 1101 1001 1101 1000 1101 1011 1101 1100 1101 1000 1101 101 Remainder
Choice of C(x) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Error Detection Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Error Recovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object]
Shared Media and Local Area Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multiple Access Links and LANs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Typical LAN Structure ROM Ethernet Processor ,[object Object],[object Object],[object Object],RAM RAM
Adaptors Communicating ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],sending node rcving node network packet adapter adapter link layer protocol frame frame
MAC (Physical) Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAC (Physical, or LAN) Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAC Sub-layer Data link layer 802.3 CSMA-CD 802.5 Token Ring 802.2  Logical link control Physical layer MAC LLC 802.11 Wireless LAN Network layer Network layer Physical layer OSI IEEE 802 Various physical layers Other LANs
Broadcast Links: Multiple Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Random Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlled Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Taxonomy of MAC Protocols WiFi (802.11)
Pure (unslotted) Aloha ,[object Object],[object Object]
Slotted Aloha ,[object Object],[object Object],[object Object],Success (S), Collision (C),  Empty (E) slots
Performance of Aloha Protocols S = throughput = “goodput”  (success rate) G = offered load = Np 0.5 1.0 1.5 2.0 0.1 0.2 0.3 0.4 Pure Aloha Slotted Aloha
Carrier Sense Multiple Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Persistent and Non-persistent CSMA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CD ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collisions A B A B A B A B
Worst Case Collision Detection Time
CSMA/CD: Illustration
Ethernet Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Dest addr 64 48 32 CRC Preamble Src addr Type Body 16 48
Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object],Metcalfe’s Ethernet sketch
Ethernet Frame Format ,[object Object],DIX frame format IEEE 802.3 format ,[object Object],[object Object],[object Object],[object Object],Dest addr 8 bytes 6 4 CRC Preamble Src addr Type Data 2 6 0-1500 Dest addr 8 bytes 6 4 CRC Preamble Src addr Length Data 2 6 0-1500
Fields in Ethernet Frame Format ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IEEE 802.3 MAC:  Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IEEE 802.3 Parameters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet MAC Protocol: Basic Ideas ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet CSMA/CD Illustration
Ethernet CSMA/CD Alg. Flow Chart
Ethernet CSMA/CD Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet’s CSMA/CD (more) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CD Efficiency ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IEEE 802.3 Physical Layer IEEE 802.3 10 Mbps medium alternatives Thick Coax: Stiff, hard to work with  T connectors flaky Hubs & Switches! (a) transceivers (b) Point-to-point link Star Bus Bus Topology 2 km 100 m 2 00 m 5 00 m Max. Segment Length Optical  f iber T wisted pair Thin coax Thick coax Medium 10base FX 10base T 10base 2 10base 5
Ethernet Technologies: 10Base2 ,[object Object],[object Object],[object Object],[object Object],[object Object]
10BaseT  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],hub nodes
Ethernet Hubs & Switches Twisted Pair Cheap Easy to work with Reliable Star-topology CSMA-CD Twisted Pair Cheap Bridging increases scalability Separate collision domains Full duplex operation (a)                 Single collision domain (b)           High-Speed backplane or interconnection fabric
Evolution of Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
100Base T (Fast) Ethernet: Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fast (100Mbps) Ethernet IEEE 802.3 100 Mbps Ethernet medium alternatives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Star Star Star Topology 2 km 100 m 100 m Max. Segment Length Optical fiber multimode Two strands Twisted pair category 5 UTP two pairs Twisted pair category 3 UTP 4 pairs Medium 100baseFX 100baseT 100baseT4
Gigabit Ethernet Gigabit Ethernet Physical Layer Specification (IEEE 802.3 1 Gigabit  Ethernet medium alternatives) Star Star Star Star Topology 100 m 25 m 5 km 550 m Max. Segment Length Twisted pair category 5 UTP Shielded copper cable Optical fiber  single mode Two strands Optical fiber  multimode Two strands Medium 1000baseT 1000baseCX 1000baseLX 1000baseSX
Gigabit Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Carrier Extension ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RRRRRRRRRRRRR Frame Carrier Extension 512 bytes
Frame Bursting ,[object Object],[object Object],[object Object],[object Object],512 bytes Extension Frame Frame Frame Frame Frame burst
10 Gigabit Ethernet IEEE 802.3 10 Gbps Ethernet medium alternatives ,[object Object],[object Object],[object Object],[object Object],[object Object],300 m – 10 km 40 km 10 km 300 m Max. Segment Length Two optical fibers multimode/single-mode with four wavelengths at 1310 nm band 8B10B code Two optical fibers  Single-mode at 1550 nm SONET compatibility Two optical fibers Single-mode at 1310 nm 64B66B Two optical fibers Multimode at 850 nm 64B66B code Medium 10GbaseLX4 10GbaseEW 10GBaseLR 10GbaseSR
Typical Ethernet Deployment Server 100 Mbps links 10 Mbps links Server Server Server 100 Mbps links 10 Mbps links Server 100 Mbps links 10 Mbps links Server Gigabit Ethernet links Gigabit Ethernet links Server farm Department A Department B Department C Hub  Hub  Hub  Ethernet switch  Ethernet switch  Ethernet switch  Switch/router  Switch/router
Ethernet Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Token based Multiple Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ring Topology
Token Ring (IEEE 802.5) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Token Ring Performance ,[object Object],where
Token Release T oken Frame T oken Frame Release after Transmission Release after Reception
Tokens and Data Frames Body Checksum Src addr Variable 48 Dest addr 48 32 End delimiter 8 Frame status 8 Frame control 8 Access control 8 Start delimiter 8
Token Ring Frame Fields ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Priority and Reservation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ring Maintenance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fault Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Token Ring Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet  vs  Token Ring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
FDDI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FDDI vs. 802.5 (Token Ring)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Timed Token Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Timed Token Algorithm (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FDDI Failure Recovery
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Token bus
Token busToken bus
Token bus
Denver Rockfreak
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
Hattori Sidek
 
13 atm
13 atm13 atm
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
kuramartin
 
Some Ccna basic detail
Some Ccna basic detailSome Ccna basic detail
Some Ccna basic detail
muneebalisyed
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
Anuj Gupta
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction
東原 李
 
Wired LANs
Wired LANsWired LANs
Wired LANs
Meenakshi Paul
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
Chandra Meena
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
seanraz
 
Ccna4 mod5-frame relay
Ccna4 mod5-frame relayCcna4 mod5-frame relay
Ccna4 mod5-frame relay
CYBERINTELLIGENTS
 
9 lan
9 lan9 lan
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
Hareem Naz
 
Frame relay
Frame relayFrame relay
Frame relay
Ayesha Maqsood
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
Kishore Kumar
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
Hitesh Mohapatra
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
JaironLanda
 
Sdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsSdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basics
Paul Andrew
 
Computer networks ct2
Computer networks ct2Computer networks ct2
Computer networks ct2
Md. Mashiur Rahman
 

What's hot (20)

Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Token bus
Token busToken bus
Token bus
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 
13 atm
13 atm13 atm
13 atm
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Some Ccna basic detail
Some Ccna basic detailSome Ccna basic detail
Some Ccna basic detail
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction
 
Wired LANs
Wired LANsWired LANs
Wired LANs
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
 
Ccna4 mod5-frame relay
Ccna4 mod5-frame relayCcna4 mod5-frame relay
Ccna4 mod5-frame relay
 
9 lan
9 lan9 lan
9 lan
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
 
Frame relay
Frame relayFrame relay
Frame relay
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Sdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsSdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basics
 
Computer networks ct2
Computer networks ct2Computer networks ct2
Computer networks ct2
 

Viewers also liked

Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
Tutun Juhana
 
SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」
SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」
SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」
Hideaki Tokida
 
Achieving Scalability and speed with IBM Solutions - IaaS Softlayer
Achieving Scalability and speed with IBM Solutions -  IaaS SoftlayerAchieving Scalability and speed with IBM Solutions -  IaaS Softlayer
Achieving Scalability and speed with IBM Solutions - IaaS Softlayer
Ana Alves Sequeira
 
SoftLayer ネットワークサービス基礎編
SoftLayer ネットワークサービス基礎編SoftLayer ネットワークサービス基礎編
SoftLayer ネットワークサービス基礎編
Hideaki Tokida
 
Packet tracer 설치 및 사용법
Packet tracer 설치 및 사용법Packet tracer 설치 및 사용법
Packet tracer 설치 및 사용법
Sehan Lee
 
IBM Cloud SoftLayer Introduction & Hands-on 2016
IBM Cloud SoftLayer Introduction & Hands-on 2016IBM Cloud SoftLayer Introduction & Hands-on 2016
IBM Cloud SoftLayer Introduction & Hands-on 2016
Atsumori Sasaki
 
Ch12
Ch12Ch12
Ch14
Ch14Ch14
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARD
Kak Yong
 
IBM SoftLayer Diret Link patterns
IBM SoftLayer Diret Link patternsIBM SoftLayer Diret Link patterns
IBM SoftLayer Diret Link patterns
Tomoyuki Niijima
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
Vuz Dở Hơi
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
Steven Cahill
 
CSMA/CA
CSMA/CACSMA/CA

Viewers also liked (13)

Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」
SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」
SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」
 
Achieving Scalability and speed with IBM Solutions - IaaS Softlayer
Achieving Scalability and speed with IBM Solutions -  IaaS SoftlayerAchieving Scalability and speed with IBM Solutions -  IaaS Softlayer
Achieving Scalability and speed with IBM Solutions - IaaS Softlayer
 
SoftLayer ネットワークサービス基礎編
SoftLayer ネットワークサービス基礎編SoftLayer ネットワークサービス基礎編
SoftLayer ネットワークサービス基礎編
 
Packet tracer 설치 및 사용법
Packet tracer 설치 및 사용법Packet tracer 설치 및 사용법
Packet tracer 설치 및 사용법
 
IBM Cloud SoftLayer Introduction & Hands-on 2016
IBM Cloud SoftLayer Introduction & Hands-on 2016IBM Cloud SoftLayer Introduction & Hands-on 2016
IBM Cloud SoftLayer Introduction & Hands-on 2016
 
Ch12
Ch12Ch12
Ch12
 
Ch14
Ch14Ch14
Ch14
 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARD
 
IBM SoftLayer Diret Link patterns
IBM SoftLayer Diret Link patternsIBM SoftLayer Diret Link patterns
IBM SoftLayer Diret Link patterns
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
CSMA/CA
CSMA/CACSMA/CA
CSMA/CA
 

Similar to Direct Link Lan

MACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismMACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanism
supriyaharlapur1
 
MAC.ppt
MAC.pptMAC.ppt
MAC.ppt
MAC.pptMAC.ppt
MAC.ppt
maheshnanda14
 
Mac
MacMac
Link layer
Link layerLink layer
Link layer
Belete Kidane
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin Jani
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
syedhaiderraza
 
Mac
MacMac
wireless.ppt
wireless.pptwireless.ppt
wireless.ppt
SandipPradhan23
 
Mac
MacMac
F06_Lecture7_etherne..
F06_Lecture7_etherne..F06_Lecture7_etherne..
F06_Lecture7_etherne..
webhostingguy
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
sangusajjan
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
8251 08 Serial
8251 08 Serial8251 08 Serial
8251 08 Serial
Aisu
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
Anitha Selvan
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileip
VIKAS SINGH BHADOURIA
 
Humming code error detector 7_communications.ppt
Humming code error detector 7_communications.pptHumming code error detector 7_communications.ppt
Humming code error detector 7_communications.ppt
nesarahmad37
 
Lan
LanLan
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
Mike Qaissaunee
 

Similar to Direct Link Lan (20)

MACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanismMACPresentation based on medium access control mechanism
MACPresentation based on medium access control mechanism
 
MAC.ppt
MAC.pptMAC.ppt
MAC.ppt
 
MAC.ppt
MAC.pptMAC.ppt
MAC.ppt
 
Mac
MacMac
Mac
 
Link layer
Link layerLink layer
Link layer
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
 
Mac
MacMac
Mac
 
wireless.ppt
wireless.pptwireless.ppt
wireless.ppt
 
Mac
MacMac
Mac
 
F06_Lecture7_etherne..
F06_Lecture7_etherne..F06_Lecture7_etherne..
F06_Lecture7_etherne..
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
8251 08 Serial
8251 08 Serial8251 08 Serial
8251 08 Serial
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileip
 
Humming code error detector 7_communications.ppt
Humming code error detector 7_communications.pptHumming code error detector 7_communications.ppt
Humming code error detector 7_communications.ppt
 
Lan
LanLan
Lan
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 

Recently uploaded

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 

Recently uploaded (20)

“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 

Direct Link Lan

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Encodings (cont) Bits NRZ Clock Manchester NRZI 0 0 1 0 1 1 1 1 0 1 0 0 0 0 1 0
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. CRC Example Generator 1101 11111001 10011010 000 Message 1101 1001 1101 1000 1101 1011 1101 1100 1101 1000 1101 101 Remainder
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. MAC Sub-layer Data link layer 802.3 CSMA-CD 802.5 Token Ring 802.2 Logical link control Physical layer MAC LLC 802.11 Wireless LAN Network layer Network layer Physical layer OSI IEEE 802 Various physical layers Other LANs
  • 28.
  • 29.
  • 30.
  • 31. Taxonomy of MAC Protocols WiFi (802.11)
  • 32.
  • 33.
  • 34. Performance of Aloha Protocols S = throughput = “goodput” (success rate) G = offered load = Np 0.5 1.0 1.5 2.0 0.1 0.2 0.3 0.4 Pure Aloha Slotted Aloha
  • 35.
  • 36.
  • 37.
  • 38. Collisions A B A B A B A B
  • 39. Worst Case Collision Detection Time
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 49. Ethernet CSMA/CD Alg. Flow Chart
  • 50.
  • 51.
  • 52.
  • 53. IEEE 802.3 Physical Layer IEEE 802.3 10 Mbps medium alternatives Thick Coax: Stiff, hard to work with T connectors flaky Hubs & Switches! (a) transceivers (b) Point-to-point link Star Bus Bus Topology 2 km 100 m 2 00 m 5 00 m Max. Segment Length Optical f iber T wisted pair Thin coax Thick coax Medium 10base FX 10base T 10base 2 10base 5
  • 54.
  • 55.
  • 56. Ethernet Hubs & Switches Twisted Pair Cheap Easy to work with Reliable Star-topology CSMA-CD Twisted Pair Cheap Bridging increases scalability Separate collision domains Full duplex operation (a)       Single collision domain (b)     High-Speed backplane or interconnection fabric
  • 57.
  • 58.
  • 59.
  • 60. Gigabit Ethernet Gigabit Ethernet Physical Layer Specification (IEEE 802.3 1 Gigabit Ethernet medium alternatives) Star Star Star Star Topology 100 m 25 m 5 km 550 m Max. Segment Length Twisted pair category 5 UTP Shielded copper cable Optical fiber single mode Two strands Optical fiber multimode Two strands Medium 1000baseT 1000baseCX 1000baseLX 1000baseSX
  • 61.
  • 62.
  • 63.
  • 64.
  • 65. Typical Ethernet Deployment Server 100 Mbps links 10 Mbps links Server Server Server 100 Mbps links 10 Mbps links Server 100 Mbps links 10 Mbps links Server Gigabit Ethernet links Gigabit Ethernet links Server farm Department A Department B Department C Hub Hub Hub Ethernet switch Ethernet switch Ethernet switch Switch/router Switch/router
  • 66.
  • 67.
  • 69.
  • 70.
  • 71. Token Release T oken Frame T oken Frame Release after Transmission Release after Reception
  • 72. Tokens and Data Frames Body Checksum Src addr Variable 48 Dest addr 48 32 End delimiter 8 Frame status 8 Frame control 8 Access control 8 Start delimiter 8
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.  
  • 78.
  • 79.
  • 80.  
  • 81.
  • 82.
  • 83.
  • 84.
  • 86.
  • 87.
  • 88.
  • 89.