gita sinha assistant professor, dr. apj abdul kalam women ...lnmuacin.in/studentnotice/2020/4....

14
By Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga, Bihar 4/23/2020 Distributed computing 1

Upload: others

Post on 12-Aug-2020

19 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,

By

Gita Sinha Assistant Professor,

Dr. APJ Abdul Kalam Women's Institute of

Technology, L.N. M. U . Darbhanga, Bihar

4/23/2020Distributed computing 1

Page 2: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,

We can consider the data link layer as two sublayers. The upper sublayer is

responsible for data link control, and the lower sublayer is responsible for

resolving access to the shared media. If the channel is dedicated, we do not need

the lower sublayer. Figure 1 shows these two sublayers in the data link layer.Fig.1- Data link layer divided into two functionality-oriented sublayers

Page 3: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,

IEEE has actually made this division for LANs. The upper sublayer that is

responsible for flow and error control is called the logical link control (LLC) layer;

the lower sublayer that is mostly responsible for multiple access resolution is called

the media access control (MAC) layer.

We have already learned about some random access protocol like

ALOHA,CSMA/CD which is mentioned in our syllabus.

We need to define the following concept of IEEE 802.3 Ethernet which is also a

part of Data link layer

Contention access- Second, no rules specify which station should send next.

Stations compete with one another to access the medium. That is why these

methods are also called contention methods.

Note- there are two concepts first one is Random Access and second one is

contention access.

In next slide we will see basic concept of IEEE 802.3 Ethernet

Page 4: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,

In 1985, the Computer Society of the IEEE started a project, called Project 802, to

set standards to enable intercommunication among equipment from a variety of

manufacturers. Project 802 is a way of specifying functions of the physical layer

and the data link layer of major LAN protocols.

fig- 2 IEEE standard for LANs

Page 5: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,

The original Ethernet was created in 1976 at Xerox’s Palo Alto Research Center

(PARC). Since then, it has gone through four generations. We briefly discuss the

Standard (or traditional) Ethernet in this section.

Figure 3 Ethernet evolution through four generations

Page 6: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,

MAC Sublayer In Standard Ethernet, the MAC sublayer governs the operation of

the access method. It also frames data received from the upper layer and passes

them to the physical layer.

Frame Format of MAC frame is shown in Figure 4.

The Ethernet frame contains seven fields: preamble, SFD, DA, SA, length or type

of protocol data unit (PDU), upper-layer data, and the CRC. Ethernet does not

provide any mechanism for acknowledging received frames, making it what is

known as an unreliable medium. Acknowledgments must be implemented at the

higher layers.

Page 7: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,

Preamble. It contains 7 bytes (56 bits) of alternating Os and Is that alerts the receiving

system to the coming frame and enables it to synchronize its input timing.

Start frame delimiter (SFD). -The second field (l byte: 10101011) signals the beginning of

the frame. The SFD warns the station or stations that this is the last chance for

synchronization. The last 2 bits is 11 and alerts the receiver that the next

field is the destination address.

Destination address (DA). -It contains the physical address of the destination station or

stations to receive the packet.

Source address (SA). It contains the physical address of the sender of the packet.

Length or type. This field is defined as a type field or length field. The original Ethernet used

this field as the type field to define the upper-layer protocol using the MAC frame. The IEEE

standard used it as the length field to define the number of bytes in the data field. Both uses

are common today.

Data. This field carries data encapsulated from the upper-layer protocols. It is a minimum of

46 and a maximum of 1500 bytes,

CRC. Cyclic redundancy check - The last field contains error detection information,

Page 8: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,

Figure 5 Categories of Standard Ethernet

Page 9: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,

Figure 6 implementation of 10BaseS

The first implementation is called 10BaseS, thick Ethernet, or Thicknet. The nickname

derives from the size of the cable, which is roughly the size of a garden hose

and too stiff to bend with your hands. lOBaseS was the first Ethernet specification to

use a bus topology with an external transceiver (transmitter/receiver) connected via a

tap to a thick coaxial cable.

Page 10: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,

DefinitionFigure 7 10Base2: Thin Ethernet

The second implementation is called

lOBase2, thin Ethernet, or

Cheapernet. IOBase2 also uses a

bus topology, but the cable is much

thinner and more flexible. The cable

can be bent to pass very close to the

stations.

In this case, the transceiver is

normally part of the network interface

card (NIC), which is installed inside

the station. Figure 7 shows the

schematic diagram of a IOBase2

implementation.

Page 11: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,

lOBase-T or twisted-pair Ethernet definition.

Figure 8. Implementation of lOBase-Tor twisted-pair Ethernet

The third implementation is calledlOBase-T or twisted-pair Ethernet.1OBase-T uses a physical startopology. The stations are connectedto a hub via two pairs of twistedcable, as shown in Figure 8.

Note that two pairs of twisted cablecreate two paths (one for sending andone for receiving) between the stationand the hub. Any collision herehappens in the hub. Compared tolOBaseS or lOBase2, we can see thatthe hub actually replaces the coaxialcable as far as a collision isconcerned. The maximum length ofthe twisted cable here is defined as100 m, to minimize the effect ofattenuation in the twisted cable.

Page 12: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,

Definition of lOBase-F: Fiber Ethernet

Figure 9- implementation of lOBase-F: Fiber Ethernet

Although there are several types of

optical fiber lO-Mbps Ethernet, the

most common is called 10Base-F.

lOBase-F uses a star topology to

connect stations to a hub. The stations

are connected to the hub using two

fiber-optic cables, as shown in Figure

9.

Page 13: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,
Page 14: Gita Sinha Assistant Professor, Dr. APJ Abdul Kalam Women ...lnmuacin.in/studentnotice/2020/4. Ethernet.pdf · Dr. APJ Abdul Kalam Women's Institute of Technology, L.N. M. U . Darbhanga,

4/23/2020Distributed computing 14