CN-Unit-3
CN-Unit-3
The upper sublayer is responsible for flow and error control is called as LLC (Logical Link Control)
layer.
The lower sublayer is responsible for Multiple access resolution is called Media Access Control(MAC)
layer.
Multiple Access Protocols:
1|P a g e
ALOHA:
ALOHA, the earliest random access method, was developed at the University of Hawaii in early 1970.
It was designed for a radio (wireless) LAN, but it can be used on any shared medium.
It is obvious that there are potential collisions in this arrangement.
The medium is shared between the stations. When a station sends data, another station may attempt
to do so at the same time. The data from the two stations collide and become garbled.
There are two forms of ALOHA
1. Pure ALOHA
2. Slotted ALOHA
Pure ALOHA:
The original ALOHA protocol is called pure ALOHA. This is a simple, but elegant protocol.
The idea is that each station sends a frame whenever it has a frame to send.
Since there is only one channel to share, there is the possibility of collision between frames
from different stations.
A collision involves two or more stations.
2|P a g e
o Let us assume that the stations send fixed-length frames with each frame taking Tfr s
to send.
o The Above figure gives the vulnerable time of the Station A, Station A sends a frame at
time t. Now imagine station B has already sent a frame between t - Tfr and t. This leads to
a collision between the frames from station A and station B. The end of B's frame collides
with the beginning of A's frame.
o On the other hand, suppose that station C sends a frame between t and t+Tfr. Here, there
is a collision between frames from station A and station C. The beginning of C's frame
collides with the end of A's frame.
o The vulnerable time, during which a collision may occur in pure ALOHA, is 2 times the
frame transmission time.
Pure ALOHA vulnerable time = 2 x Tfr
Slotted ALOHA:
Slotted ALOHA was invented to improve the efficiency of pure ALOHA.
In slotted ALOHA we divide the time into slots of Tfr s and force the station to send only at the
beginning of the time slot.
Because a station is allowed to send only at the beginning of the synchronized time slot, if a
station misses this moment, it must wait until the beginning of the next time slot. This means
that the station which started at the beginning of this slot has already finished sending its
frame.
3|P a g e
4|P a g e
5|P a g e
6|P a g e
P-Persistent CSMA:
o The p-persistent method is used if the channel has time slots with a slot duration equal
to or greater than the maximum propagation time.
o The p-persistent approach combines the advantages of the other two strategies.
o It reduces the chance of collision and improves efficiency.
o In this method, after the station finds the line idle it follows these steps:
1. With probability p, the station sends its frame.
2. With probability q = 1 - p, the station waits for the beginning of the next time slot
and checks the line again.
a. If the line is idle, it goes to step 1.
b. If the line is busy, it acts as though a collision has occurred and uses the back-
off procedure.
7|P a g e
At time t1, station A has executed its persistence procedure and starts sending the bits of its frame.
At time t2, station C has not yet sensed the first bit sent by A. Station C executes its persistence
procedure and starts sending the bits in its frame, which propagate both to the left and to the right.
The collision occurs sometime after time t2 Station C detects a collision at time t3 when it receives
8|P a g e
10 | P a g e
11 | P a g e
Controlled Access:
Polling:
12 | P a g e
Token Passing:
13 | P a g e
Channelization:
14 | P a g e
Figure: FDMA
Figure: TDMA
15 | P a g e
16 | P a g e
Figure: CDMA
17 | P a g e
*******************
18 | P a g e
Basic Ethernet
Ethernet is a set of technologies and protocols that are used primarily in LANs.
However, Ethernet can also be used in MANs and even WANs. It was first standardized
in the 1980s as IEEE 802.3 standard. Since then, it has gone through four generations,
as shown in the following chart
Standard Ethernet is also referred to as Basic Ethernet. It uses 10Base5 coaxial cables
for communications. Ethernet provides service up to the data link layer. At the data link
layer, Ethernet divides the data stream received from the upper layers and
encapsulates it into frames, before passing them on to the physical layer.
The main parts of an Ethernet frame are
Preamble − It is the starting field that provides alert and timing pulse for transmission.
Destination Address − It is a 6-byte field containing the physical address of destination
stations.
Source Address − It is a 6-byte field containing the physical address of the sending
station.
Length − It stores the number of bytes in the data field.
Data and Padding − This carries the data from the upper layers.
CRC − It contains error detection information.
Standard Ethernet has many physical layer implementations. The four main physical
layer implementations are shown in the following diagram
Fast Ethernet :
In computer networks, Fast Ethernet is a variation of Ethernet standards that carry data
traffic at 100 Mbps (Mega bits per second) in local area networks (LAN). It was
launched as the IEEE 802.3u standard in 1995, and stayed the fastest network till the
introduction of Gigabit Ethernet.
Fast Ethernet is popularly named as 100-BASE-X. Here, 100 is the maximum
throughput, i.e. 100 Mbps, BASE denoted use of baseband transmission, and X is the
type of medium used, which is TX or FX.
100-Base-T4
o This has four pairs of UTP of Category 3, two of which are bi-directional
and the other two are unidirectional.
o In each direction, three pairs can be used simultaneously for data
transmission.
o Each twisted pair is capable of transmitting a maximum of 25Mbaud data.
Thus the three pairs can handle a maximum of 75Mbaud data.
o It uses the encoding scheme 8B/6T (eight binary/six ternary).
100-Base-TX
o This has either two pairs of unshielded twisted pairs (UTP) category 5
wires or two shielded twisted pairs (STP) type 1 wires. One pair transmits
frames from hub to the device and the other from device to hub.
o Maximum distance between hub and station is 100m.
Gigabit Ethernet:
Gigabit Ethernet is a variant of the Ethernet technology generally used in local area
networks (LANs) for sending Ethernet frames at 1 Gbps. It can be used as a backbone
in several networks, especially those of large organizations.
Gigabit Ethernet is an enlargement to the earlier 10 Mbps and 100 Mbps 802.3
Ethernet standards. It provides 1,000 Mbps bandwidth while supporting full
compatibility with the set up base of around 100 million Ethernet nodes.
Gigabit Ethernet usually employs an optical fibre connection to share records at a very
huge speed over high distances. For short distances, copper cables and twisted pair
connections are utilized.
10 Gigabit Ethernet :
In 10 Gigabit Ethernet, it is a telecommunications technology that sends data packets
over Ethernet for 10 billion bits per second. This innovation improved the traditional and
well-known use of Ethernet in the local area network (LAN) to a much wider area of
network application, such as high-speed storage area networks (SAN), wide area
networks (WAN), and metropolitan area networks (MAN).
10 GbE differs from traditional Ethernet in that it takes benefit of full-duplex protocol, in
which data is sent in both directions simultaneously by utilizing a networking switch to
link devices.
This defines that the technology diverges from the Carrier Sense Multiple
Access/Collision Detection (CSMA/CD) protocols, which are rules that can decide how
network devices will respond when two devices try to use a data channel
simultaneously, also known as a collision.
10GBase-SR
Defined by IEEE 802.3ae standard
Uses fiber optic cables
Maximum segment length is 300 m
Deployed using multimode fibers having 0.85μ frequency
10GBase-LR
Defined by IEEE 802.3ae standard
Uses fiber optic cables
Maximum segment length is 10 km
Deployed using single-mode fibers having 1.3μ frequency
10GBase-ER
Defined by IEEE 802.3ae standard
Uses fiber optic cables
Maximum segment length is 40 km
Deployed using single-mode fibers having 1.5μ frequency
10GBase-CX4
Defined by IEEE 802.3ak standard
Uses 4 pairs of twin-axial cables
Maximum segment length is 15 m
Uses 8B/10B coding
10GBase-T
Defined by IEEE 802.3an standard
Uses 4 pairs of unshielded twisted pair cables
Maximum segment length is 100 m
Uses low-density parity-check code (LPDC code)