Mạng máy tính 1 - Lecture 3: Networking technologies

Association Disassociation Reassociation Distribution Integration Distribution Services

pdf52 trang | Chia sẻ: nguyenlam99 | Lượt xem: 750 | Lượt tải: 0download
Bạn đang xem trước 20 trang tài liệu Mạng máy tính 1 - Lecture 3: Networking technologies, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Lecture 3: Networking Technologies Reference: Chapter 4 - “Computer Networks”, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. Faculty of Computer Science and Engineering - HCMUT Content Channel Allocation Problem Multiple Access Protocols Faculty of Computer Science and Engineering - HCMUT Two types of transmission technology Point-to-Point Link Broadcast Link Faculty of Computer Science and Engineering - HCMUT Channel Allocation Problem Who's first? Faculty of Computer Science and Engineering - HCMUT Channel Allocation Problem Static Method Dynamic Method Faculty of Computer Science and Engineering - HCMUT Static Channel Allocation in LANs and MANs KEY: Each user is assigned with a equal-portion of the bandwidth Plus: 1. Simple 2. No interference Minus: 1. Ineffective bandwidth utilization 2. Some users will be denied in high traffic Faculty of Computer Science and Engineering - HCMUT Dynamic Channel Allocation in LANs and MANs 1. Station Model 2. Single Channel Assumptions 3. Collision Assumption 4. Continuous Time vs Slotted Time 5. Carrier Sense vs No Carrier Sense Key assumptions Faculty of Computer Science and Engineering - HCMUT Multiple Access Protocols ALOHA Carrier Sense Multiple Access Protocols Collision-Free Protocols Faculty of Computer Science and Engineering - HCMUT ALOHA Idea: Users can transmit whenever they have data to send Two types of ALOHA: Pure ALOHA Slotted ALOHA The main difference between them is time and time and time Aloha!! Faculty of Computer Science and Engineering - HCMUT Pure ALOHA continuous time no global time synchronization frame Send & then wait for collision collision? end n o wait a random time yes Faculty of Computer Science and Engineering - HCMUT Pure ALOHA – vulnerable period t – frame time, to – starting time Faculty of Computer Science and Engineering - HCMUT Slotted ALOHA 1. Time is divided to equal intervals (slots) 2. Need time synchronization 3. Frames can only be transmitted at starts of time slots Faculty of Computer Science and Engineering - HCMUT Slotted ALOHA – who's next? Faculty of Computer Science and Engineering - HCMUT Channel utilization Faculty of Computer Science and Engineering - HCMUT CSMA with Collision Detection (CSMA/CD) Idea: A station stop transmitting its frame immediately after a collision is detected to save time and bandwidth This is the basis of Ethernet LAN How? But: half-duplex Faculty of Computer Science and Engineering - HCMUT Propagation Delay & CD Faculty of Computer Science and Engineering - HCMUT Collision-free Protocols The basic bit-map control Idea: At the contention period, all station announce their needs to transmit. And then at the transmission period all registered stations take turn to send their frames. Drawback: suffer n bits delay in contention period Faculty of Computer Science and Engineering - HCMUT Collision-Free Protocols The binary countdown protocol Unique binary station addresses with the same length Rules: •Compete by “OR” with other bits in the same order •If there is a “0 to 1 transformation” in the result → give up Faculty of Computer Science and Engineering - HCMUT The Adaptive Tree Walk Protocol Distributed Depth-first tree walk Faculty of Computer Science and Engineering - HCMUT The Adaptive Tree Walk Protocol - improvement At heavy traffic, skip nodes father nodes 1,2,3,... Number of nodes at level i: 2^i Assume that, p is number of ready stations. Then k = p/2^i is number of ready stations per node at level i Optimal: k = 1 or p/2^i= 1 from this i = log2(p) Faculty of Computer Science and Engineering - HCMUT Wavelength Division MA Protocols (WDMA) To allow multiple transmissions the spectrum is divided into channels (wavelength bands) Total internal reflection: n1>n2 i1>ilimit Faculty of Computer Science and Engineering - HCMUT WDMA Each station is assigned two channels: control & data and two transmitters and two receivers 1. A fixed-wavelength receiver for listening to its own control channel. 2. A fixed-wavelength transmitter for outputting data frames. 3. A tunable transmitter for sending on other stations' control channels. 4. A tunable receiver for selecting a data transmitter to listen to. Faculty of Computer Science and Engineering - HCMUT WDMA Require global time synchronization for both channels Faculty of Computer Science and Engineering - HCMUT Wireless LAN Protocols CSMA is not appropriate Interference at the receiver, not at the sender Hidden station problem Exposed station problem Faculty of Computer Science and Engineering - HCMUT Wireless LAN Protocols - MACA A sends RTS to B and begins transmission only after receiving CTS reply from B Faculty of Computer Science and Engineering - HCMUT Wireless LAN Protocols - MACA 1. C doesn't see CTS and thus is free to send its RTS 2. C and B may want to send RTS at the same time so cause collision. Faculty of Computer Science and Engineering - HCMUT Wireless LAN Protocols - MACAW Improvements: 1. ACK frame after each successful data frame 2. Use CSMA for RTS frame 29 Ethernet  Ethernet Cabling  Manchester Encoding  The Ethernet MAC Sublayer Protocol  Switched Ethernet  Fast Ethernet  Gigabit Ethernet 30 Ethernet Cabling The most common kinds of Ethernet cabling. 31 Ethernet Cabling (2) Three kinds of Ethernet cabling. (a) 10Base5, (b) 10Base2, (c) 10Base-T. 32 Ethernet Cabling (3) Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented. 33 Using voltage to encode binary code:  0 volts ~ 0 bit and 5 volts ~ 1 bit 0001000 = 10000000 or 01000000, because the difference between an idle sender (0 volts) and a 0 bit (0 volts) is ambiguous  -1 and +1? out of synchronization, long sequence of 0 or 1 Manchester Encoding 34 Using two voltages to encode one bit:  1 ~ high – low; 0 ~ low - high 010 = (-1,1)(1,-1)(-1,1) Plus: every bit has a transition in the middle → determine bit boundary & sync Minus: double bandwidth, 10Mbs ~ 20 mil changes per second Manchester Encoding 35 Differential Manchester encoding 1 bit ~ absence;0 bit ~ presence of a transition at the start of the interval. In both cases, there is a transition in the middle. Plus: complex equipment Minus: better noise immunity. (the 802.5 token ring) 36 Manchester Encoding (a) Binary encoding, (b) Manchester encoding, (c) Differential Manchester encoding. 37 Ethernet MAC Sublayer Protocol s 38 Ethernet MAC Sublayer Protocol Unicast: 1 receiver Multicast: group of receivers Broadcast: all 281,474,976,710,656 possible MAC addresses 39 802.3 Ethernet frame structure 40 802.3 Ethernet frame structure Header: source and destination MAC address; Ethertype protocol identifier field; optional IEEE 802.1Q VLAN tag Frame check sequence: 32-bit CRC (cyclic redundancy check) 41 In addition to there being a maximum frame length, there is also a minimum frame length. While a data field of 0 bytes is sometimes useful, it causes a problem. When a transceiver detects a collision, it truncates the current frame, which means that stray bits and pieces of frames appear on the cable all the time. To make it easier to distinguish valid frames from garbage, Ethernet requires that valid frames must be 42 Switched Ethernet A simple example of switched Ethernet. 43 Fast Ethernet 802.3u vs 802.12 802.3u:  backward compatible  unforeseen problems  technology change period Ideas:  keep all the old stuffs  reduce the bit time from 100 nsec to 10 nsec 44 Fast Ethernet The original fast Ethernet cabling. 45 Gigabit Ethernet (a) A two-station Ethernet. (b) A multistation Ethernet. 46 Gigabit Ethernet (2) Gigabit Ethernet cabling. 47 Wireless LAN Protocols  Hidden station problem  Exposed station problem A wireless LAN. (a) A transmitting B. (b) B transmitting A. 48 The 802.11 MAC Sublayer Protocol (1) The use of virtual channel sensing using CSMA/CA 49 The 802.11 MAC Sublayer Protocol (2) A fragment burst. 50 The 802.11 Frame Structure The 802.11 data frame. 51 802.11 Services • Association • Disassociation • Reassociation • Distribution • Integration Distribution Services 52 802.11 Services • Authentication • Deauthentication • Privacy • Data Delivery Intracell Services

Các file đính kèm theo tài liệu này:

  • pdfmmt1_lec3_2_channelaccess_9652.pdf
Tài liệu liên quan