SlideShare a Scribd company logo
1 of 49
Underlying Technologies 
ET3003 Computer Networks 
4 
Tutun Juhana 
Telecommunication Engineering 
School of Electrical Engineering & Informatics 
Institut Teknologi Bandung
Two types of networks 
at the data link layer 
– Broadcast Networks: All stations share a single 
communication channel 
– Point-to-Point Networks: Pairs of hosts (or routers) 
are directly connected 
2 
Broadcast Network Point-to-Point Network 
• Typically, local area networks (LANs) are broadcast and wide area 
networks (WANs) are point-to-point
WIRED LOCAL AREA NETWORKS 
3
• A local area network (LAN) is a computer 
network that is designed for a limited 
geographic area such as a building or a 
campus 
• Most LANs today are also linked to a wide 
area network (WAN) or the Internet 
4
FDDI 
Fiber Distributed Data Interface 
Token Ring 
Token Bus 
ATM LAN 
IEEE Standard Project 802, designed to 
regulate the manufacturing and 
interconnectivity between different LANs 
5
IEEE Standards 
• Project 802 is a way of specifying 
functions of the physical layer and the data 
link layer of major LAN protocols 
6
The Ethernet 
• Robert Melancton 
"Bob" Metcalfe 
(born April 7,1946) 
is an electrical 
engineer from the 
United States who 
co-invented 
Ethernet 
7
Frame Format 
‘Length” used by 
IEEE standard to 
define the number of 
bytes in the data field 
“Type” used by 
original Ethernet to 
define upper-layer 
protocol using the 
frame 
8
Frame Length 
• The minimum length restriction is required for the correct operation of CSMA/CD 
• If the upper-layer packet is less than 46 bytes, padding is added to make up the 
difference 
Reason for the maximum length restriction: 
1. To reduce the size of the buffer (memory was very expensive when Ethernet was 
designed) 
2. It prevents one station from monopolizing the shared medium 
9
Addressing 
• Each station on an Ethernet network has its own 
network interface card (NIC) 
• The NIC provides the station with a 6-byte 
physical address 
10
• Ethernet Address 
– The address normally is referred to as the 
data link address, physical address, or MAC 
address 
11
12 
Example: 
• 00-14-22 OUI for Dell 
• 00-04-DC for Nortel 
• 00-40-96 for Cisco 
• 00-30-BD for Belkin
• The address is sent left-to-right, byte by byte 
• For each byte, it is sent right-to-left, bit by bit 
• Example 
– Show how the address 47:20:1B:2E:08:EE is sent out 
on line 
13
Unicast, Multicast, and Broadcast Addresses 
• A source address is always a unicast 
address 
– the frame comes from only one station 
• The destination address can be unicast, 
multicast, or broadcast 
14
• The broadcast address is a special case of 
the multicast address; the recipients are all 
the stations on the LAN 
15
• Define the type of the following destination 
addresses 
– 4A:30:10:21:10:1A 
– 47:20:1B:2E:08:EE 
– FF:FF:FF:FF:FF:FF 
16
Ethernet Evolution 
17
STANDARD ETHERNET 
18
Access Method: CSMA/CD 
• The IEEE 802.3 standard defines carrier 
sense multiple access with collision 
detection (CSMA/CD) as the access 
method for traditional Ethernet 
19
• Stations on a traditional Ethernet can be 
connected together using a physical bus or star 
topology, but the logical topology is always a bus 
Physical star, logically bus topology 
20 
Physical bus topology 
• The medium (channel) is shared between stations and only one station at 
a time can use it 
• All stations receive a frame sent by a station (broadcasting) 
• The real destination keeps the frame while the rest drop it
• How can we be 
sure that two 
stations are not 
using the medium at 
the same time? 
• If they do, their 
frames will collide 
with each other 
21
22
• To minimize the chance of collision and, 
therefore, increase the performance, the 
CSMA method was developed 
23
• Carrier sense multiple access (CSMA) 
requires that each station first listen to the 
medium (or check the state of the 
medium) before sending 
– sense before transmit, or 
– listen before talk 
• CSMA can reduce the possibility of 
collision, but it cannot eliminate it 
– The possibility of collision still exists because 
of propagation delay 24
Space/time model of a collision in CSMA 
25
Collision of the first bit in CSMA/CD 
• A transmits for the duration t4 - t1; C transmits for the duration t3 - t2 
 for the protocol to work, the length of any frame divided by the bit 
rate in this protocol must be more than either of these durations 
• Before sending the last bit of the frame, the sending station must 
detect a collision, if any, and abort the transmission  because, once 
the entire frame is sent, station does not keep a copy of the frame and 
does not monitor the line for collision detection 26
Minimum Frame Size 
27 
The worst collision on a shared bus 
http://cnp3book.info.ucl.ac.be/lan/lan/
• The frame transmission time Tfr must be at 
least two times the maximum propagation 
time Tp 
28
• Example 
– In the standard Ethernet, if the maximum 
propagation time is 25.6 μs, what is the 
minimum size of the frame? 
29
CSMA/CD flow diagram 
The station transmits 
and receives 
continuously and 
simultaneously 
(using two different 
ports) 
30
Implementation 
31
FAST ETHERNET 
32
• IEEE created Fast Ethernet under the name 802.3u 
• Fast Ethernet is backward-compatible with Standard 
Ethernet, but 10 times faster (100 Mbps) 
• The goals of Fast Ethernet: 
1. Upgrade the data rate to 100 Mbps 
2. Make it compatible with Standard Ethernet 
3. Keep the same 48-bit address. 
4. Keep the same frame format. 
5. Keep the same minimum and maximum frame lengths 
33
MAC Sublayer 
• Keep only the star topology 
– There are two choices: half duplex and full duplex 
– In the half-duplex approach, the stations are 
connected via a hub 
– in the full-duplex approach, the connection is made 
via a switch with buffers at each port 
• The access method is the same (CSMA/CD) for 
the half-duplex approach 
• For full-duplex there is no need for CSMA/CD 
– The implementations keep CSMA/CD for backward 
compatibility with Standard Ethernet 
34
Autonegotiation 
• Autonegotiation allows two 
devices to negotiate the mode 
or data rate of operation 
• It was designed particularly for 
the following purposes: 
– To allow incompatible devices to 
connect to one another 
– To allow one device to have 
multiple capabilities 
– To allow a station to check a 
hub’s capabilities. 
35
Implementation 
36
GIGABIT ETHERNET 
37
• Gigabit Ethernet (IEEE 802.3z) 
• The goals of the Gigabit Ethernet: 
1. Upgrade the data rate to 1 Gbps 
2. Make it compatible with Standard or Fast Ethernet 
3. Use the same 48-bit address 
4. Use the same frame format 
5. Keep the same minimum and maximum frame 
lengths. 
6. To support autonegotiation as defined in Fast 
Ethernet 
38
MAC Sublayer 
• A main consideration: keep the MAC 
sublayer untouched  To achieve a data 
rate of 1 Gbps, this was no longer possible 
• Gigabit Ethernet has two distinctive 
approaches for medium access 
1. Half-duplex 
2. Full-duplex 
• Almost all implementations of Gigabit 
Ethernet follow the full-duplex approach 
39
Full-Duplex Mode 
• There is a central switch connected to all 
computers or other switches 
– Each switch has buffers for each input port in which 
data are stored until they are transmitted 
• There is no collision in this mode  CSMA/CD 
is not used 
• The maximum length of the cable is determined 
by the signal attenuation in the cable, not by the 
collision detection process 
40
Half-Duplex Mode 
• A switch can be replaced by a hub  a 
collision might occur  CSMA/CD is used 
 the maximum length of the network is 
totally dependent on the minimum frame 
size 
• Three solutions have been defined: 
1. Traditional 
2. Carrier extension 
3. Frame bursting 
41
• Traditional approach 
– Keep the minimum frame length 512 bits 
– The maximum network length only 25 m 
(because the length of a bit is 1/100 shorter 
than in standard Ethernet) 
• It may not even be long enough to connect the 
computers in one single office 
42
• Carrier Extension 
– Increase the minimum frame length  512 bytes (4096 bits)  
8 times longer 
– It forces a station to add extension bits (padding) to any frame 
that is less than 4096 bits 
– The maximum length of the network can be increased 8 times 
to a length of 200 m 
– This allows a length of 100 m from the hub to the station 
43 
Frame RRRRRRRRRRRRR 
Carrier Extension 
512 bytes
Carrier Extension is very inefficient if we 
have a series of short frames to send (each 
frame carries redundant data) 
44
• Frame Bursting 
– To improve efficiency, frame bursting was proposed 
– Instead of adding an extension to each frame, 
multiple frames are sent 
• To make these multiple frames look like one frame, padding 
is added between the frames (96 bits) so that the channel is 
not idle  The method deceives other stations into thinking 
that a very large frame has been transmitted 
45 
Frame Extension Frame Frame Frame 
512 bytes 
Frame burst 
Maximum frame burst is 8192 bytes
Gigabit Ethernet Implementation 
46
TEN-GIGABIT ETHERNET 
47
• Ten-Gigabit Ethernet standard : IEEE802.3ae 
• The goals : 
1. Upgrade the data rate to 10 Gbps. 
2. Make it compatible with Standard, Fast, and Gigabit Ethernet. 
3. Use the same 48-bit address. 
4. Use the same frame format. 
5. Keep the same minimum and maximum frame lengths. 
6. Allow the interconnection of existing LANs into a metropolitan 
area network (MAN) or a wide area network (WAN) 
7. Make Ethernet compatible with technologies such as Frame 
Relay and ATM. 
48
Implementation 
• Ten-Gigabit Ethernet operates only in full 
duplex mode  no need for contention  
CSMA/CD is not used 
49

More Related Content

What's hot

Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Tutun Juhana
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Sachin Morya
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routingMd. Mashiur Rahman
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
 
Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Tutun Juhana
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentationzameer Abbas
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Sachin Morya
 
Media Access Control
Media Access ControlMedia Access Control
Media Access ControlHusnainHadi
 

What's hot (20)

Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)Et3003 sem2-1314-8 network layers v (icmpv4)
Et3003 sem2-1314-8 network layers v (icmpv4)
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Unit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part BUnit 3 - Data Link Layer - Part B
Unit 3 - Data Link Layer - Part B
 
9 lan
9 lan9 lan
9 lan
 
Switching seminar ppt
Switching seminar pptSwitching seminar ppt
Switching seminar ppt
 
Switching
SwitchingSwitching
Switching
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Answer sheet of switching & routing
Answer sheet of switching & routingAnswer sheet of switching & routing
Answer sheet of switching & routing
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
VLAN on packet Tracer
VLAN on packet TracerVLAN on packet Tracer
VLAN on packet Tracer
 
Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)Et3003 sem2-1314-6 network layers iii (arp)
Et3003 sem2-1314-6 network layers iii (arp)
 
Switching Concepts presentation
Switching Concepts presentationSwitching Concepts presentation
Switching Concepts presentation
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 

Similar to Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)

Similar to Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015) (20)

Ethernet 19 20
Ethernet 19 20Ethernet 19 20
Ethernet 19 20
 
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATIONCCNA BASIC SWITCHING AND SWITCH CONFIGURATION
CCNA BASIC SWITCHING AND SWITCH CONFIGURATION
 
Basic switch and switch configuration.pptx
Basic switch and switch configuration.pptxBasic switch and switch configuration.pptx
Basic switch and switch configuration.pptx
 
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.pptMEDIUM ACCESS CONTROL Sublayer IN CN.ppt
MEDIUM ACCESS CONTROL Sublayer IN CN.ppt
 
3-MACSublayer.ppt
3-MACSublayer.ppt3-MACSublayer.ppt
3-MACSublayer.ppt
 
CCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATIONCCNA SWITCHING AND CONFIGURATION
CCNA SWITCHING AND CONFIGURATION
 
ETHERNET IEEE802.pptx
ETHERNET IEEE802.pptxETHERNET IEEE802.pptx
ETHERNET IEEE802.pptx
 
Lan basic
Lan basicLan basic
Lan basic
 
Fast_Ethernet.ppt
Fast_Ethernet.pptFast_Ethernet.ppt
Fast_Ethernet.ppt
 
FAST ETHERNET
FAST ETHERNET FAST ETHERNET
FAST ETHERNET
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
ethernet.ppt
ethernet.pptethernet.ppt
ethernet.ppt
 
Ethernet copy
Ethernet   copyEthernet   copy
Ethernet copy
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2
 
IEEE standard
IEEE standardIEEE standard
IEEE standard
 
Cn blue tooth
Cn blue toothCn blue tooth
Cn blue tooth
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
Communication Networks basics and very important topic
Communication Networks basics and very important topicCommunication Networks basics and very important topic
Communication Networks basics and very important topic
 
Lan
LanLan
Lan
 

More from Tutun Juhana

What should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraWhat should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraTutun Juhana
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 
ET4045-3-attacks-1
ET4045-3-attacks-1ET4045-3-attacks-1
ET4045-3-attacks-1Tutun Juhana
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3Tutun Juhana
 
ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2Tutun Juhana
 
ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014Tutun Juhana
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014Tutun Juhana
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Tutun Juhana
 
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)Tutun Juhana
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansTutun Juhana
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Tutun Juhana
 
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Tutun Juhana
 
ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)Tutun Juhana
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)Tutun Juhana
 
6 2 transport layer (tcp)
6 2 transport layer (tcp)6 2 transport layer (tcp)
6 2 transport layer (tcp)Tutun Juhana
 
Transport Layer (UDP)
Transport Layer (UDP)Transport Layer (UDP)
Transport Layer (UDP)Tutun Juhana
 

More from Tutun Juhana (20)

What should you prepare for industry 4.0 era
What should you prepare for industry 4.0 eraWhat should you prepare for industry 4.0 era
What should you prepare for industry 4.0 era
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
ET4045-3-attacks-1
ET4045-3-attacks-1ET4045-3-attacks-1
ET4045-3-attacks-1
 
ET4045-2-cryptography-3
ET4045-2-cryptography-3ET4045-2-cryptography-3
ET4045-2-cryptography-3
 
ET4045-2-cryptography-2
ET4045-2-cryptography-2ET4045-2-cryptography-2
ET4045-2-cryptography-2
 
ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014ET4045-2-cryptography-1-2014
ET4045-2-cryptography-1-2014
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
Switching Techniques (Lecture #2 ET3003 Sem1 2014/2015)
 
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
Introduction to Computer Networks (Lecture #1 ET3003 Sem1 2014/2015)
 
Et3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlansEt3003 sem2-1314-10 vlans
Et3003 sem2-1314-10 vlans
 
Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)Et3003 sem2-1314-5 network layers ii (intro to routing)
Et3003 sem2-1314-5 network layers ii (intro to routing)
 
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)Et3003 sem2-1314-4 network layers i (ipv4 addressing)
Et3003 sem2-1314-4 network layers i (ipv4 addressing)
 
ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)ET3003-1 introduction (Semester II 2013-2014)
ET3003-1 introduction (Semester II 2013-2014)
 
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)ET3003-2 OSI-TCPIP (Semester II 2013-2014)
ET3003-2 OSI-TCPIP (Semester II 2013-2014)
 
IPv6 Introduction
IPv6 IntroductionIPv6 Introduction
IPv6 Introduction
 
6 2 transport layer (tcp)
6 2 transport layer (tcp)6 2 transport layer (tcp)
6 2 transport layer (tcp)
 
VLANs
VLANsVLANs
VLANs
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Transport Layer (UDP)
Transport Layer (UDP)Transport Layer (UDP)
Transport Layer (UDP)
 

Recently uploaded

Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 

Recently uploaded (20)

Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 

Underlying Technologies Part I (Lecture #4 ET3003 Sem1 2014/2015)

  • 1. Underlying Technologies ET3003 Computer Networks 4 Tutun Juhana Telecommunication Engineering School of Electrical Engineering & Informatics Institut Teknologi Bandung
  • 2. Two types of networks at the data link layer – Broadcast Networks: All stations share a single communication channel – Point-to-Point Networks: Pairs of hosts (or routers) are directly connected 2 Broadcast Network Point-to-Point Network • Typically, local area networks (LANs) are broadcast and wide area networks (WANs) are point-to-point
  • 3. WIRED LOCAL AREA NETWORKS 3
  • 4. • A local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus • Most LANs today are also linked to a wide area network (WAN) or the Internet 4
  • 5. FDDI Fiber Distributed Data Interface Token Ring Token Bus ATM LAN IEEE Standard Project 802, designed to regulate the manufacturing and interconnectivity between different LANs 5
  • 6. IEEE Standards • Project 802 is a way of specifying functions of the physical layer and the data link layer of major LAN protocols 6
  • 7. The Ethernet • Robert Melancton "Bob" Metcalfe (born April 7,1946) is an electrical engineer from the United States who co-invented Ethernet 7
  • 8. Frame Format ‘Length” used by IEEE standard to define the number of bytes in the data field “Type” used by original Ethernet to define upper-layer protocol using the frame 8
  • 9. Frame Length • The minimum length restriction is required for the correct operation of CSMA/CD • If the upper-layer packet is less than 46 bytes, padding is added to make up the difference Reason for the maximum length restriction: 1. To reduce the size of the buffer (memory was very expensive when Ethernet was designed) 2. It prevents one station from monopolizing the shared medium 9
  • 10. Addressing • Each station on an Ethernet network has its own network interface card (NIC) • The NIC provides the station with a 6-byte physical address 10
  • 11. • Ethernet Address – The address normally is referred to as the data link address, physical address, or MAC address 11
  • 12. 12 Example: • 00-14-22 OUI for Dell • 00-04-DC for Nortel • 00-40-96 for Cisco • 00-30-BD for Belkin
  • 13. • The address is sent left-to-right, byte by byte • For each byte, it is sent right-to-left, bit by bit • Example – Show how the address 47:20:1B:2E:08:EE is sent out on line 13
  • 14. Unicast, Multicast, and Broadcast Addresses • A source address is always a unicast address – the frame comes from only one station • The destination address can be unicast, multicast, or broadcast 14
  • 15. • The broadcast address is a special case of the multicast address; the recipients are all the stations on the LAN 15
  • 16. • Define the type of the following destination addresses – 4A:30:10:21:10:1A – 47:20:1B:2E:08:EE – FF:FF:FF:FF:FF:FF 16
  • 19. Access Method: CSMA/CD • The IEEE 802.3 standard defines carrier sense multiple access with collision detection (CSMA/CD) as the access method for traditional Ethernet 19
  • 20. • Stations on a traditional Ethernet can be connected together using a physical bus or star topology, but the logical topology is always a bus Physical star, logically bus topology 20 Physical bus topology • The medium (channel) is shared between stations and only one station at a time can use it • All stations receive a frame sent by a station (broadcasting) • The real destination keeps the frame while the rest drop it
  • 21. • How can we be sure that two stations are not using the medium at the same time? • If they do, their frames will collide with each other 21
  • 22. 22
  • 23. • To minimize the chance of collision and, therefore, increase the performance, the CSMA method was developed 23
  • 24. • Carrier sense multiple access (CSMA) requires that each station first listen to the medium (or check the state of the medium) before sending – sense before transmit, or – listen before talk • CSMA can reduce the possibility of collision, but it cannot eliminate it – The possibility of collision still exists because of propagation delay 24
  • 25. Space/time model of a collision in CSMA 25
  • 26. Collision of the first bit in CSMA/CD • A transmits for the duration t4 - t1; C transmits for the duration t3 - t2  for the protocol to work, the length of any frame divided by the bit rate in this protocol must be more than either of these durations • Before sending the last bit of the frame, the sending station must detect a collision, if any, and abort the transmission  because, once the entire frame is sent, station does not keep a copy of the frame and does not monitor the line for collision detection 26
  • 27. Minimum Frame Size 27 The worst collision on a shared bus http://cnp3book.info.ucl.ac.be/lan/lan/
  • 28. • The frame transmission time Tfr must be at least two times the maximum propagation time Tp 28
  • 29. • Example – In the standard Ethernet, if the maximum propagation time is 25.6 μs, what is the minimum size of the frame? 29
  • 30. CSMA/CD flow diagram The station transmits and receives continuously and simultaneously (using two different ports) 30
  • 33. • IEEE created Fast Ethernet under the name 802.3u • Fast Ethernet is backward-compatible with Standard Ethernet, but 10 times faster (100 Mbps) • The goals of Fast Ethernet: 1. Upgrade the data rate to 100 Mbps 2. Make it compatible with Standard Ethernet 3. Keep the same 48-bit address. 4. Keep the same frame format. 5. Keep the same minimum and maximum frame lengths 33
  • 34. MAC Sublayer • Keep only the star topology – There are two choices: half duplex and full duplex – In the half-duplex approach, the stations are connected via a hub – in the full-duplex approach, the connection is made via a switch with buffers at each port • The access method is the same (CSMA/CD) for the half-duplex approach • For full-duplex there is no need for CSMA/CD – The implementations keep CSMA/CD for backward compatibility with Standard Ethernet 34
  • 35. Autonegotiation • Autonegotiation allows two devices to negotiate the mode or data rate of operation • It was designed particularly for the following purposes: – To allow incompatible devices to connect to one another – To allow one device to have multiple capabilities – To allow a station to check a hub’s capabilities. 35
  • 38. • Gigabit Ethernet (IEEE 802.3z) • The goals of the Gigabit Ethernet: 1. Upgrade the data rate to 1 Gbps 2. Make it compatible with Standard or Fast Ethernet 3. Use the same 48-bit address 4. Use the same frame format 5. Keep the same minimum and maximum frame lengths. 6. To support autonegotiation as defined in Fast Ethernet 38
  • 39. MAC Sublayer • A main consideration: keep the MAC sublayer untouched  To achieve a data rate of 1 Gbps, this was no longer possible • Gigabit Ethernet has two distinctive approaches for medium access 1. Half-duplex 2. Full-duplex • Almost all implementations of Gigabit Ethernet follow the full-duplex approach 39
  • 40. Full-Duplex Mode • There is a central switch connected to all computers or other switches – Each switch has buffers for each input port in which data are stored until they are transmitted • There is no collision in this mode  CSMA/CD is not used • The maximum length of the cable is determined by the signal attenuation in the cable, not by the collision detection process 40
  • 41. Half-Duplex Mode • A switch can be replaced by a hub  a collision might occur  CSMA/CD is used  the maximum length of the network is totally dependent on the minimum frame size • Three solutions have been defined: 1. Traditional 2. Carrier extension 3. Frame bursting 41
  • 42. • Traditional approach – Keep the minimum frame length 512 bits – The maximum network length only 25 m (because the length of a bit is 1/100 shorter than in standard Ethernet) • It may not even be long enough to connect the computers in one single office 42
  • 43. • Carrier Extension – Increase the minimum frame length  512 bytes (4096 bits)  8 times longer – It forces a station to add extension bits (padding) to any frame that is less than 4096 bits – The maximum length of the network can be increased 8 times to a length of 200 m – This allows a length of 100 m from the hub to the station 43 Frame RRRRRRRRRRRRR Carrier Extension 512 bytes
  • 44. Carrier Extension is very inefficient if we have a series of short frames to send (each frame carries redundant data) 44
  • 45. • Frame Bursting – To improve efficiency, frame bursting was proposed – Instead of adding an extension to each frame, multiple frames are sent • To make these multiple frames look like one frame, padding is added between the frames (96 bits) so that the channel is not idle  The method deceives other stations into thinking that a very large frame has been transmitted 45 Frame Extension Frame Frame Frame 512 bytes Frame burst Maximum frame burst is 8192 bytes
  • 48. • Ten-Gigabit Ethernet standard : IEEE802.3ae • The goals : 1. Upgrade the data rate to 10 Gbps. 2. Make it compatible with Standard, Fast, and Gigabit Ethernet. 3. Use the same 48-bit address. 4. Use the same frame format. 5. Keep the same minimum and maximum frame lengths. 6. Allow the interconnection of existing LANs into a metropolitan area network (MAN) or a wide area network (WAN) 7. Make Ethernet compatible with technologies such as Frame Relay and ATM. 48
  • 49. Implementation • Ten-Gigabit Ethernet operates only in full duplex mode  no need for contention  CSMA/CD is not used 49